f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, &(0x7f0000000600)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000240)=[{}], 0x1, 0x0, 0x0, 0x20004840}, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r3, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001b00)=[{&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324693070a7c3f36773d824c32c383ac9d9ea47d98e9596d4b7024fce9decbc540c8a61821b83a05ee97b39c4f733e4c9063dfd5d8d2ed128", 0xc9}], 0x1}, 0x4000001) 02:17:41 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgrp(0xffffffffffffffff) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, 0x0) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:41 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, 0x0) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:41 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000001a00)}], 0x4, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:41 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r3, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, 0x0, r1}], 0x20, 0x4}, 0x4000001) 02:17:41 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgrp(0xffffffffffffffff) stat(&(0x7f0000001c00)='./file0\x00', 0x0) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, 0x0) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)="22d7a71a162386fc7f773642fc01716f593a1b14b03f6369b2f1015612572a354ad782215316232dbcc916bd5ea3d7fafe0782c1358f7cec6c0db98ccb4846239fc5282e038ee2177570b77acd", 0x4d}], 0x1, 0x0, 0x0, 0x20004840}, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r4, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000001a00)}], 0x1, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r2}], 0x20, 0x4}, 0x4000001) 02:17:41 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000000980)="d2e9bf7dcf6179277d94eee7264a34baa3a9be934535cb6f366df143013cdf2945082551bf2bc773eb1da3b59113cc7c2a3244f001116c0fcb81c7d341cc937d2806bb5308e1b97ef3fdd13166f45fbfe46a52ab5f1c8934cdb05a023962", 0x5e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324", 0x92}], 0x5, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:41 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgrp(0xffffffffffffffff) stat(&(0x7f0000001c00)='./file0\x00', 0x0) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, 0x0) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)="22d7a71a162386fc7f773642fc01716f593a1b14b03f6369b2f1015612572a354ad782215316232dbcc916bd5ea3d7fafe0782c1358f7cec6c0db98ccb4846239fc5282e038ee2177570b77acd", 0x4d}], 0x1, 0x0, 0x0, 0x20004840}, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r4, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000001a00)}], 0x1, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r2}], 0x20, 0x4}, 0x4000001) 02:17:41 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r3, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, 0x0, r1}], 0x20, 0x4}, 0x4000001) 02:17:41 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:41 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgrp(0xffffffffffffffff) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, 0x0) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:41 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000001a00)}], 0x4, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:41 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:42 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b74", 0x4b}], 0x4, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:42 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000000980)="d2e9bf7dcf6179277d94eee7264a34baa3a9be934535cb6f366df143013cdf2945082551bf2bc773eb1da3b59113cc7c2a3244f001116c0fcb81c7d341cc937d2806bb5308e1b97ef3fdd13166f45fbfe46a52ab5f1c8934cdb05a023962", 0x5e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324", 0x92}], 0x5, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:42 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:42 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:42 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r3, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, 0x0, r1}], 0x20, 0x4}, 0x4000001) 02:17:42 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b74", 0x4b}], 0x4, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:42 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r4, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r2}], 0x20, 0x4}, 0x4000001) 02:17:42 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r3, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, 0x0, r1}], 0x20, 0x4}, 0x4000001) 02:17:42 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:42 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000000980)="d2e9bf7dcf6179277d94eee7264a34baa3a9be934535cb6f366df143013cdf2945082551bf2bc773eb1da3b59113cc7c2a3244f001116c0fcb81c7d341cc937d2806bb5308e1b97ef3fdd13166f45fbfe46a52ab5f1c8934cdb05a023962", 0x5e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324", 0x92}], 0x5, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:42 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgrp(0xffffffffffffffff) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, &(0x7f0000000600)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000240)=[{}], 0x1, 0x0, 0x0, 0x20004840}, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001b00)=[{&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324693070a7c3f36773d824c32c383ac9d9ea47d98e9596d4b7024fce9decbc", 0xb0}], 0x1, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:42 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b74", 0x4b}], 0x4, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:42 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgrp(0xffffffffffffffff) stat(&(0x7f0000001c00)='./file0\x00', 0x0) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, 0x0) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)="22d7a71a162386fc7f773642fc01716f593a1b14b03f6369b2f1015612572a354ad782215316232dbcc916bd5ea3d7fafe0782c1358f7cec6c0db98ccb4846239fc5282e038ee2177570b77acd", 0x4d}], 0x1, 0x0, 0x0, 0x20004840}, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r4, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37", 0x7e}], 0x1, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r2}], 0x20, 0x4}, 0x4000001) 02:17:42 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r4, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r2}], 0x20, 0x4}, 0x4000001) 02:17:42 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:42 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgrp(0xffffffffffffffff) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, &(0x7f0000000600)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000240)=[{}], 0x1, 0x0, 0x0, 0x20004840}, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001b00)=[{&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324693070a7c3", 0x97}], 0x1, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:42 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f16434", 0x71}], 0x4, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:42 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)) fstat(r1, &(0x7f0000001d40)) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r3, 0xffffffffffffffff, 0x0, 0x0) 02:17:42 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f16434", 0x71}], 0x4, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:42 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgrp(0xffffffffffffffff) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, &(0x7f0000000600)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000240)=[{}], 0x1, 0x0, 0x0, 0x20004840}, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001b00)=[{&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324693070a7c3", 0x97}], 0x1, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:42 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgrp(0xffffffffffffffff) stat(&(0x7f0000001c00)='./file0\x00', 0x0) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, 0x0) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)="22d7a71a162386fc7f773642fc01716f593a1b14b03f6369b2f1015612572a354ad782215316232dbcc916bd5ea3d7fafe0782c1358f7cec6c0db98ccb4846239fc5282e038ee2177570b77acd", 0x4d}], 0x1, 0x0, 0x0, 0x20004840}, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r4, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d", 0x7d}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r2}], 0x20, 0x4}, 0x4000001) 02:17:42 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r4, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r2}], 0x20, 0x4}, 0x4000001) 02:17:42 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)) fstat(r1, &(0x7f0000001d40)) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r3, 0xffffffffffffffff, 0x0, 0x0) 02:17:42 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:42 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f16434", 0x71}], 0x4, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:42 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgrp(0xffffffffffffffff) stat(&(0x7f0000001c00)='./file0\x00', 0x0) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, 0x0) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)="22d7a71a162386fc7f773642fc01716f593a1b14b03f6369b2f1015612572a354ad782215316232dbcc916bd5ea3d7fafe0782c1358f7cec6c0db98ccb4846239fc5282e038ee2177570b77acd", 0x4d}], 0x1, 0x0, 0x0, 0x20004840}, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r4, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d", 0x7d}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r2}], 0x20, 0x4}, 0x4000001) 02:17:42 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)) fstat(r1, &(0x7f0000001d40)) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r3, 0xffffffffffffffff, 0x0, 0x0) 02:17:42 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:42 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgrp(0xffffffffffffffff) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, &(0x7f0000000600)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000240)=[{}], 0x1, 0x0, 0x0, 0x20004840}, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001b00)=[{&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324693070a7c3", 0x97}], 0x1, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:42 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r5, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:43 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:43 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379dd", 0x84}], 0x4, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:43 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r5, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:43 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000000980)="d2e9bf7dcf6179277d94eee7264a34baa3a9be934535cb6f366df143013cdf2945082551bf2bc773eb1da3b59113cc7c2a3244f001116c0fcb81c7d341cc937d2806bb5308e1b97ef3fdd13166f45fbfe46a52ab5f1c8934cdb05a023962", 0x5e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324", 0x92}], 0x5, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:43 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r4, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r2}], 0x20, 0x4}, 0x4000001) 02:17:43 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgrp(0xffffffffffffffff) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, &(0x7f0000000600)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000240)=[{}], 0x1, 0x0, 0x0, 0x20004840}, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001b00)=[{&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324693070a7c3", 0x97}], 0x1, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:43 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379dd", 0x84}], 0x4, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:43 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r5, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:43 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, 0x0, 0x0, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:43 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r4, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r2}], 0x20, 0x4}, 0x4000001) 02:17:43 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000000980)="d2e9bf7dcf6179277d94eee7264a34baa3a9be934535cb6f366df143013cdf2945082551bf2bc773eb1da3b59113cc7c2a3244f001116c0fcb81c7d341cc937d2806bb5308e1b97ef3fdd13166f45fbfe46a52ab5f1c8934cdb05a023962", 0x5e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324", 0x92}], 0x5, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:43 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379dd", 0x84}], 0x4, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:43 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:43 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000000980)="d2e9bf7dcf6179277d94eee7264a34baa3a9be934535cb6f366df143013cdf2945082551bf2bc773eb1da3b59113cc7c2a3244f001116c0fcb81c7d341cc937d2806bb5308e1b97ef3fdd13166f45fbfe46a52ab5f1c8934cdb05a023962", 0x5e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324", 0x92}], 0x5, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:43 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:43 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r4, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r2}], 0x20, 0x4}, 0x4000001) 02:17:43 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r4, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r2, r1}], 0x20, 0x4}, 0x4000001) 02:17:43 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e", 0x8d}], 0x4, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:43 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r5, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:43 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000000980)="d2e9bf7dcf6179277d94eee7264a34baa3a9be934535cb6f366df143013cdf2945082551bf2bc773eb1da3b59113cc7c2a3244f001116c0fcb81c7d341cc937d2806bb5308e1b97ef3fdd13166f45fbfe46a52ab5f1c8934cdb05a023962", 0x5e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324", 0x92}], 0x5, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:43 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:43 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r5, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:44 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e", 0x8d}], 0x4, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:44 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r4, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r2, r1}], 0x20, 0x4}, 0x4000001) 02:17:44 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000000980)="d2e9bf7dcf6179277d94eee7264a34baa3a9be934535cb6f366df143013cdf2945082551bf2bc773eb1da3b59113cc7c2a3244f001116c0fcb81c7d341cc937d2806bb5308e1b97ef3fdd13166f45fbfe46a52ab5f1c8934cdb05a023962", 0x5e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324", 0x92}], 0x5, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:44 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e", 0x8d}], 0x4, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:44 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r5, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:44 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e", 0x8d}], 0x4, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:44 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r4, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r2, r1}], 0x20, 0x4}, 0x4000001) 02:17:44 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000000980)="d2e9bf7dcf6179277d94eee7264a34baa3a9be934535cb6f366df143013cdf2945082551bf2bc773eb1da3b59113cc7c2a3244f001116c0fcb81c7d341cc937d2806bb5308e1b97ef3fdd13166f45fbfe46a52ab5f1c8934cdb05a023962", 0x5e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324", 0x92}], 0x5, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:44 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e", 0x8d}], 0x4, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:44 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e", 0x8d}], 0x4, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:44 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:44 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324", 0x92}], 0x4, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:44 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:44 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r4, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r2, r1}], 0x20, 0x4}, 0x4000001) 02:17:44 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324", 0x92}], 0x4, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:44 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e", 0x8d}], 0x4, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:44 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r5, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000000980)="d2e9bf7dcf6179277d94eee7264a34baa3a9be934535cb6f366df143013cdf2945082551bf2bc773eb1da3b59113cc7c2a3244f001116c0fcb81c7d341cc937d2806bb5308e1b97ef3fdd13166f45fbfe46a52ab5f1c8934cdb05a023962", 0x5e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324", 0x92}], 0x5, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:44 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgrp(0xffffffffffffffff) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, &(0x7f0000000600)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000240)=[{}], 0x1, 0x0, 0x0, 0x20004840}, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001b00)=[{0x0}], 0x1, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:45 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r5, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000000980)="d2e9bf7dcf6179277d94eee7264a34baa3a9be934535cb6f366df143013cdf2945082551bf2bc773eb1da3b59113cc7c2a3244f001116c0fcb81c7d341cc937d2806bb5308e1b97ef3fdd13166f45fbfe46a52ab5f1c8934cdb05a023962", 0x5e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324", 0x92}], 0x5, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:45 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:45 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r5, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000000980)="d2e9bf7dcf6179277d94eee7264a34baa3a9be934535cb6f366df143013cdf2945082551bf2bc773eb1da3b59113cc7c2a3244f001116c0fcb81c7d341cc937d2806bb5308e1b97ef3fdd13166f45fbfe46a52ab5f1c8934cdb05a023962", 0x5e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324", 0x92}], 0x5, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:45 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgrp(0xffffffffffffffff) stat(&(0x7f0000001c00)='./file0\x00', 0x0) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, 0x0) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)="22d7a71a162386fc7f773642fc01716f593a1b14b03f6369b2f1015612572a354ad782215316232dbcc916bd5ea3d7fafe0782c1358f7cec6c0db98ccb4846239fc5282e038ee2177570b77acd", 0x4d}], 0x1, 0x0, 0x0, 0x20004840}, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r4, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f1", 0x6f}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r2}], 0x20, 0x4}, 0x4000001) 02:17:45 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324", 0x92}], 0x4, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:45 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r4, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r2, r1}], 0x20, 0x4}, 0x4000001) 02:17:45 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgrp(0xffffffffffffffff) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, &(0x7f0000000600)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000240)=[{}], 0x1, 0x0, 0x0, 0x20004840}, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001b00)=[{&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324693070a7c3f36773d824c32c383ac9d9ea47d98e9596d4b7024fce9decbc540c8a61821b83a05ee97b39c4f733e4c9063dfd5d8d2ed128", 0xc9}], 0x1, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:45 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r5, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000000980)="d2e9bf7dcf6179277d94eee7264a34baa3a9be934535cb6f366df143013cdf2945082551bf2bc773eb1da3b59113cc7c2a3244f001116c0fcb81c7d341cc937d2806bb5308e1b97ef3fdd13166f45fbfe46a52ab5f1c8934cdb05a023962", 0x5e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324", 0x92}], 0x5, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:45 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgrp(0xffffffffffffffff) stat(&(0x7f0000001c00)='./file0\x00', 0x0) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, 0x0) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)="22d7a71a162386fc7f773642fc01716f593a1b14b03f6369b2f1015612572a354ad782215316232dbcc916bd5ea3d7fafe0782c1358f7cec6c0db98ccb4846239fc5282e038ee2177570b77acd", 0x4d}], 0x1, 0x0, 0x0, 0x20004840}, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r4, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f1", 0x6f}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r2}], 0x20, 0x4}, 0x4000001) 02:17:45 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r4, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r2, r1}], 0x20, 0x4}, 0x4000001) 02:17:45 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgrp(0xffffffffffffffff) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, 0x0) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r5, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324693070a7c3f36773d824c32c383ac9d9ea47d98e9596d4b7024fce9decbc540c8a61821b83a05ee97b39c4f733e4c9063dfd5d8d2ed128", 0xc9}], 0x1, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:45 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d3246930", 0x94}], 0x4, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:45 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r5, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000000980)="d2e9bf7dcf6179277d94eee7264a34baa3a9be934535cb6f366df143013cdf2945082551bf2bc773eb1da3b59113cc7c2a3244f001116c0fcb81c7d341cc937d2806bb5308e1b97ef3fdd13166f45fbfe46a52ab5f1c8934cdb05a023962", 0x5e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324", 0x92}], 0x5, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:45 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:45 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgrp(0xffffffffffffffff) stat(&(0x7f0000001c00)='./file0\x00', 0x0) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, 0x0) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)="22d7a71a162386fc7f773642fc01716f593a1b14b03f6369b2f1015612572a354ad782215316232dbcc916bd5ea3d7fafe0782c1358f7cec6c0db98ccb4846239fc5282e038ee2177570b77acd", 0x4d}], 0x1, 0x0, 0x0, 0x20004840}, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r4, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37", 0x7e}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r2}], 0x20, 0x4}, 0x4000001) 02:17:45 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)) fstat(r1, &(0x7f0000001d40)) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r3, 0xffffffffffffffff, 0x0, 0x0) 02:17:45 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r5, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000000980)="d2e9bf7dcf6179277d94eee7264a34baa3a9be934535cb6f366df143013cdf2945082551bf2bc773eb1da3b59113cc7c2a3244f001116c0fcb81c7d341cc937d2806bb5308e1b97ef3fdd13166f45fbfe46a52ab5f1c8934cdb05a023962", 0x5e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324", 0x92}], 0x5, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:45 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d3246930", 0x94}], 0x4, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:45 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:45 executing program 1: r0 = syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r4, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r2, r1}], 0x20, 0x4}, 0x4000001) 02:17:46 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000000980)="d2e9bf7dcf6179277d94eee7264a34baa3a9be934535cb6f366df143013cdf2945082551bf2bc773eb1da3b59113cc7c2a3244f001116c0fcb81c7d341cc937d2806bb5308e1b97ef3fdd13166f45fbfe46a52ab5f1c8934cdb05a023962", 0x5e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324", 0x92}], 0x5, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:46 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:46 executing program 1: r0 = syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r4, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r2, r1}], 0x20, 0x4}, 0x4000001) 02:17:46 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r4, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r2, r1}], 0x20, 0x4}, 0x4000001) 02:17:46 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d3246930", 0x94}], 0x4, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:46 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000000980)="d2e9bf7dcf6179277d94eee7264a34baa3a9be934535cb6f366df143013cdf2945082551bf2bc773eb1da3b59113cc7c2a3244f001116c0fcb81c7d341cc937d2806bb5308e1b97ef3fdd13166f45fbfe46a52ab5f1c8934cdb05a023962", 0x5e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324", 0x92}], 0x5, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:46 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)) fstat(r1, &(0x7f0000001d40)) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r3, 0xffffffffffffffff, 0x0, 0x0) 02:17:46 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:46 executing program 1: r0 = syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r4, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r2, r1}], 0x20, 0x4}, 0x4000001) 02:17:46 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324693070", 0x95}], 0x4, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:46 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r4, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r2, r1}], 0x20, 0x4}, 0x4000001) 02:17:46 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)) fstat(r1, &(0x7f0000001d40)) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r3, 0xffffffffffffffff, 0x0, 0x0) 02:17:46 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000000980)="d2e9bf7dcf6179277d94eee7264a34baa3a9be934535cb6f366df143013cdf2945082551bf2bc773eb1da3b59113cc7c2a3244f001116c0fcb81c7d341cc937d2806bb5308e1b97ef3fdd13166f45fbfe46a52ab5f1c8934cdb05a023962", 0x5e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324", 0x92}], 0x5, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:46 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:46 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r5, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:46 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(0x0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r4, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r2, r1}], 0x20, 0x4}, 0x4000001) 02:17:46 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r4, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r2, r1}], 0x20, 0x4}, 0x4000001) 02:17:46 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324693070", 0x95}], 0x4, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:46 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000000980)="d2e9bf7dcf6179277d94eee7264a34baa3a9be934535cb6f366df143013cdf2945082551bf2bc773eb1da3b59113cc7c2a3244f001116c0fcb81c7d341cc937d2806bb5308e1b97ef3fdd13166f45fbfe46a52ab5f1c8934cdb05a023962", 0x5e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324", 0x92}], 0x5, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:46 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgrp(0xffffffffffffffff) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, &(0x7f0000000600)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000240)=[{}], 0x1, 0x0, 0x0, 0x20004840}, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324693070a7c3", 0x97}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:46 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r5, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:47 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324693070", 0x95}], 0x4, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:47 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgrp(0xffffffffffffffff) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, &(0x7f0000000600)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000240)=[{}], 0x1, 0x0, 0x0, 0x20004840}, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324693070a7c3", 0x97}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:47 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r5, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:47 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(0x0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r4, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r2, r1}], 0x20, 0x4}, 0x4000001) 02:17:47 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgrp(0xffffffffffffffff) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, 0x0) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r5, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324693070a7c3f36773d824c32c383ac9d9ea47d98e9596d4b7024fce9decbc540c8a61821b83a05ee97b39c4f733e4c9063dfd5d8d2ed128", 0xc9}], 0x1, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:47 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000000980)="d2e9bf7dcf6179277d94eee7264a34baa3a9be934535cb6f366df143013cdf2945082551bf2bc773eb1da3b59113cc7c2a3244f001116c0fcb81c7d341cc937d2806bb5308e1b97ef3fdd13166f45fbfe46a52ab5f1c8934cdb05a023962", 0x5e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324", 0x92}], 0x5, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:47 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:47 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(0x0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r4, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r2, r1}], 0x20, 0x4}, 0x4000001) 02:17:47 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgrp(0xffffffffffffffff) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, &(0x7f0000000600)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000240)=[{}], 0x1, 0x0, 0x0, 0x20004840}, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324693070a7c3", 0x97}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:47 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324693070a7", 0x96}], 0x3, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:47 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000000980)="d2e9bf7dcf6179277d94eee7264a34baa3a9be934535cb6f366df143013cdf2945082551bf2bc773eb1da3b59113cc7c2a3244f001116c0fcb81c7d341cc937d2806bb5308e1b97ef3fdd13166f45fbfe46a52ab5f1c8934cdb05a023962", 0x5e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324", 0x92}], 0x5, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:47 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgrp(0xffffffffffffffff) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, &(0x7f0000000600)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000240)=[{}], 0x1, 0x0, 0x0, 0x20004840}, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:47 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgrp(0xffffffffffffffff) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, &(0x7f0000000600)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000240)=[{}], 0x1, 0x0, 0x0, 0x20004840}, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324693070a7c3", 0x97}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:48 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000000980)="d2e9bf7dcf6179277d94eee7264a34baa3a9be934535cb6f366df143013cdf2945082551bf2bc773eb1da3b59113cc7c2a3244f001116c0fcb81c7d341cc937d2806bb5308e1b97ef3fdd13166f45fbfe46a52ab5f1c8934cdb05a023962", 0x5e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324", 0x92}], 0x5, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:48 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgrp(0xffffffffffffffff) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, &(0x7f0000000600)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000240)=[{}], 0x1, 0x0, 0x0, 0x20004840}, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:48 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:48 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000000980)="d2e9bf7dcf6179277d94eee7264a34baa3a9be934535cb6f366df143013cdf2945082551bf2bc773eb1da3b59113cc7c2a3244f001116c0fcb81c7d341cc937d2806bb5308e1b97ef3fdd13166f45fbfe46a52ab5f1c8934cdb05a023962", 0x5e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324", 0x92}], 0x5, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:48 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:48 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', 0x0) fstat(r0, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r3, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r1}], 0x20, 0x4}, 0x4000001) 02:17:48 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324693070a7", 0x96}], 0x3, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:48 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000000980)="d2e9bf7dcf6179277d94eee7264a34baa3a9be934535cb6f366df143013cdf2945082551bf2bc773eb1da3b59113cc7c2a3244f001116c0fcb81c7d341cc937d2806bb5308e1b97ef3fdd13166f45fbfe46a52ab5f1c8934cdb05a023962", 0x5e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324", 0x92}], 0x5, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:48 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:48 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)) fstat(r1, &(0x7f0000001d40)) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r3, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324693070a7c3f36773d824c32c383ac9d9ea47d98e9596d4b7024fce9decbc540c8a61821b83a05ee97b39c4f733e4c9063dfd5d8d2ed1", 0xc8}], 0x1, 0x0, 0x0, 0x4}, 0x4000001) 02:17:48 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:48 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:48 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000000980)="d2e9bf7dcf6179277d94eee7264a34baa3a9be934535cb6f366df143013cdf2945082551bf2bc773eb1da3b59113cc7c2a3244f001116c0fcb81c7d341cc937d2806bb5308e1b97ef3fdd13166f45fbfe46a52ab5f1c8934cdb05a023962", 0x5e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324693070a7", 0x96}], 0x5, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:49 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324693070a7", 0x96}], 0x3, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:49 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', 0x0) fstat(r0, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r3, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r1}], 0x20, 0x4}, 0x4000001) 02:17:49 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000000980)="d2e9bf7dcf6179277d94eee7264a34baa3a9be934535cb6f366df143013cdf2945082551bf2bc773eb1da3b59113cc7c2a3244f001116c0fcb81c7d341cc937d2806bb5308e1b97ef3fdd13166f45fbfe46a52ab5f1c8934cdb05a023962", 0x5e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324", 0x92}], 0x5, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:49 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000000980)="d2e9bf7dcf6179277d94eee7264a34baa3a9be934535cb6f366df143013cdf2945082551bf2bc773eb1da3b59113cc7c2a3244f001116c0fcb81c7d341cc937d2806bb5308e1b97ef3fdd13166f45fbfe46a52ab5f1c8934cdb05a023962", 0x5e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324693070a7", 0x96}], 0x5, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:49 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000000980)="d2e9bf7dcf6179277d94eee7264a34baa3a9be934535cb6f366df143013cdf2945082551bf2bc773eb1da3b59113cc7c2a3244f001116c0fcb81c7d341cc937d2806bb5308e1b97ef3fdd13166f45fbfe46a52ab5f1c8934cdb05a023962", 0x5e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324", 0x92}], 0x5, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:49 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000000980)="d2e9bf7dcf6179277d94eee7264a34baa3a9be934535cb6f366df143013cdf2945082551bf2bc773eb1da3b59113cc7c2a3244f001116c0fcb81c7d341cc937d2806bb5308e1b97ef3fdd13166f45fbfe46a52ab5f1c8934cdb05a023962", 0x5e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324", 0x92}], 0x5, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:49 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:49 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgrp(0xffffffffffffffff) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, &(0x7f0000000600)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000240)=[{}], 0x1, 0x0, 0x0, 0x20004840}, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324693070a7c3f36773d824c32c383ac9d9ea47d98e9596d4b7024fce9decbc540c8a61821b83a05ee97b39c4f733e4c9063d", 0xc3}], 0x3, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:49 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {0x0}], 0x3, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:49 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', 0x0) fstat(r0, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r3, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r1}], 0x20, 0x4}, 0x4000001) 02:17:49 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000000980)="d2e9bf7dcf6179277d94eee7264a34baa3a9be934535cb6f366df143013cdf2945082551bf2bc773eb1da3b59113cc7c2a3244f001116c0fcb81c7d341cc937d2806bb5308e1b97ef3fdd13166f45fbfe46a52ab5f1c8934cdb05a023962", 0x5e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324", 0x92}], 0x5, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:49 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {0x0}], 0x3, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:49 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgrp(0xffffffffffffffff) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, &(0x7f0000000600)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000240)=[{}], 0x1, 0x0, 0x0, 0x20004840}, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324693070a7c3f36773d824c32c383ac9d9ea47d98e9596d4b7024fce9decbc540c8a61821b83a05ee97b39c4", 0xbd}], 0x3, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:49 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgrp(0xffffffffffffffff) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, &(0x7f0000000600)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000240)=[{}], 0x1, 0x0, 0x0, 0x20004840}, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324693070a7c3f36773d824c32c383ac9d9ea47d98e9596d4b7024fce9decbc540c8a61821b83a05ee97b39c4f733e4c9063d", 0xc3}], 0x3, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:49 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:49 executing program 1: syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r3, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r1, r0}], 0x20, 0x4}, 0x4000001) 02:17:50 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000000980)="d2e9bf7dcf6179277d94eee7264a34baa3a9be934535cb6f366df143013cdf2945082551bf2bc773eb1da3b59113cc7c2a3244f001116c0fcb81c7d341cc937d2806bb5308e1b97ef3fdd13166f45fbfe46a52ab5f1c8934cdb05a023962", 0x5e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324", 0x92}], 0x5, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:50 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgrp(0xffffffffffffffff) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, &(0x7f0000000600)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000240)=[{}], 0x1, 0x0, 0x0, 0x20004840}, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324693070a7c3f36773d824c32c383ac9d9ea47d98e9596d4b7024fce9decbc540c8a61821b83a05ee97b39c4", 0xbd}], 0x3, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:50 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:50 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {0x0}], 0x3, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:50 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgrp(0xffffffffffffffff) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, &(0x7f0000000600)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000240)=[{}], 0x1, 0x0, 0x0, 0x20004840}, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324693070a7c3f36773d824c32c383ac9d9ea47d98e9596d4b7024fce9decbc540c8a61821b83a05ee97b39c4f733e4c9063d", 0xc3}], 0x3, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:50 executing program 1: syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r3, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r1, r0}], 0x20, 0x4}, 0x4000001) 02:17:50 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000001a00)}], 0x3, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:50 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgrp(0xffffffffffffffff) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, &(0x7f0000000600)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000240)=[{}], 0x1, 0x0, 0x0, 0x20004840}, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324693070a7c3f36773d824c32c383ac9d9ea47d98e9596d4b7024fce9decbc540c8a61821b83a05ee97b39c4", 0xbd}], 0x3, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:50 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000000980)="d2e9bf7dcf6179277d94eee7264a34baa3a9be934535cb6f366df143013cdf2945082551bf2bc773eb1da3b59113cc7c2a3244f001116c0fcb81c7d341cc937d2806bb5308e1b97ef3fdd13166f45fbfe46a52ab5f1c8934cdb05a023962", 0x5e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324693070a7", 0x96}], 0x5, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:50 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:50 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000000980)="d2e9bf7dcf6179277d94eee7264a34baa3a9be934535cb6f366df143013cdf2945082551bf2bc773eb1da3b59113cc7c2a3244f001116c0fcb81c7d341cc937d2806bb5308e1b97ef3fdd13166f45fbfe46a52ab5f1c8934cdb05a023962", 0x5e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324", 0x92}], 0x5, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:50 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000001a00)}], 0x3, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:50 executing program 1: syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r3, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r1, r0}], 0x20, 0x4}, 0x4000001) 02:17:50 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000000980)="d2e9bf7dcf6179277d94eee7264a34baa3a9be934535cb6f366df143013cdf2945082551bf2bc773eb1da3b59113cc7c2a3244f001116c0fcb81c7d341cc937d2806bb5308e1b97ef3fdd13166f45fbfe46a52ab5f1c8934cdb05a023962", 0x5e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324693070a7", 0x96}], 0x5, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:50 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:50 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000000980)="d2e9bf7dcf6179277d94eee7264a34baa3a9be934535cb6f366df143013cdf2945082551bf2bc773eb1da3b59113cc7c2a3244f001116c0fcb81c7d341cc937d2806bb5308e1b97ef3fdd13166f45fbfe46a52ab5f1c8934cdb05a023962", 0x5e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324", 0x92}], 0x5, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:50 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000001a00)}], 0x3, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:50 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324693070a7c3f36773d824c32c383ac9d9ea47d98e9596d4b7024fce9dec", 0xaf}], 0x1, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:50 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r3, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, 0x0, r1}], 0x20, 0x4}, 0x4000001) 02:17:50 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000000980)="d2e9bf7dcf6179277d94eee7264a34baa3a9be934535cb6f366df143013cdf2945082551bf2bc773eb1da3b59113cc7c2a3244f001116c0fcb81c7d341cc937d2806bb5308e1b97ef3fdd13166f45fbfe46a52ab5f1c8934cdb05a023962", 0x5e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324693070a7", 0x96}], 0x5, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:50 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000000980)="d2e9bf7dcf6179277d94eee7264a34baa3a9be934535cb6f366df143013cdf2945082551bf2bc773eb1da3b59113cc7c2a3244f001116c0fcb81c7d341cc937d2806bb5308e1b97ef3fdd13166f45fbfe46a52ab5f1c8934cdb05a023962", 0x5e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324", 0x92}], 0x5, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:50 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b74", 0x4b}], 0x3, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:50 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:51 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000000980)="d2e9bf7dcf6179277d94eee7264a34baa3a9be934535cb6f366df143013cdf2945082551bf2bc773eb1da3b59113cc7c2a3244f001116c0fcb81c7d341cc937d2806bb5308e1b97ef3fdd13166f45fbfe46a52ab5f1c8934cdb05a023962", 0x5e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324", 0x92}], 0x5, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:51 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:51 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b74", 0x4b}], 0x3, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:51 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324693070a7c3f36773d824c32c383ac9d9ea47d98e9596d4b7024fce9dec", 0xaf}], 0x1, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:51 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r3, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, 0x0, r1}], 0x20, 0x4}, 0x4000001) 02:17:51 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgrp(0xffffffffffffffff) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, 0x0) fstat(r0, &(0x7f0000000480)) getresgid(0x0, &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, &(0x7f0000000600)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000240)=[{&(0x7f00000001c0)="22d7a71a162386fc7f773642fc01716f593a1b14b03f6369b2f1015612572a354ad782215316232dbcc916bd5ea3d7fafe0782c1358f7cec6c0db98ccb4846239fc5282e038ee2177570b77acd", 0x4d}], 0x1, 0x0, 0x0, 0x20004840}, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r5, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324693070a7c3f36773d824c32c383ac9d9ea47d98e9596d4b7024fce9decbc540c8a61821b83a05ee97b39c4f733e4c9063dfd5d8d2ed128", 0xc9}], 0x1, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:51 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:51 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b74", 0x4b}], 0x3, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:51 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r3, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, 0x0, r1}], 0x20, 0x4}, 0x4000001) 02:17:51 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000000980)="d2e9bf7dcf6179277d94eee7264a34baa3a9be934535cb6f366df143013cdf2945082551bf2bc773eb1da3b59113cc7c2a3244f001116c0fcb81c7d341cc937d2806bb5308e1b97ef3fdd13166f45fbfe46a52ab5f1c8934cdb05a023962", 0x5e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324", 0x92}], 0x5, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:51 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgrp(0xffffffffffffffff) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, 0x0) fstat(r0, &(0x7f0000000480)) getresgid(0x0, &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, &(0x7f0000000600)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000240)=[{&(0x7f00000001c0)="22d7a71a162386fc7f773642fc01716f593a1b14b03f6369b2f1015612572a354ad782215316232dbcc916bd5ea3d7fafe0782c1358f7cec6c0db98ccb4846239fc5282e038ee2177570b77acd", 0x4d}], 0x1, 0x0, 0x0, 0x20004840}, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r5, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324693070a7c3f36773d824c32c383ac9d9ea47d98e9596d4b7024fce9decbc540c8a61821b83a05ee97b39c4f733e4c9063dfd5d8d2ed128", 0xc9}], 0x1, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:51 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgrp(0xffffffffffffffff) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, &(0x7f0000000600)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000240)=[{&(0x7f00000001c0)="22d7a71a162386fc7f773642fc01716f593a1b14b03f6369b2f1015612572a354ad782215316232dbcc916bd5ea3d7fafe0782c1358f7cec6c0db98ccb4846239fc5282e038ee2177570b77acd", 0x4d}], 0x1, 0x0, 0x0, 0x20004840}, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r5, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324693070a7c3f36773d824c32c383ac9d9ea47d98e9596d4b7024fce9decbc540c8a61821b83a05ee97b39c4f733e4c9063dfd5d8d2ed128", 0xc9}], 0x1, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:51 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:51 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(0x0, &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r4, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r2, r1}], 0x20, 0x4}, 0x4000001) 02:17:51 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000000980)="d2e9bf7dcf6179277d94eee7264a34baa3a9be934535cb6f366df143013cdf2945082551bf2bc773eb1da3b59113cc7c2a3244f001116c0fcb81c7d341cc937d2806bb5308e1b97ef3fdd13166f45fbfe46a52ab5f1c8934cdb05a023962", 0x5e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324", 0x92}], 0x5, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:51 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgrp(0xffffffffffffffff) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, 0x0) fstat(r0, &(0x7f0000000480)) getresgid(0x0, &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, &(0x7f0000000600)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000240)=[{&(0x7f00000001c0)="22d7a71a162386fc7f773642fc01716f593a1b14b03f6369b2f1015612572a354ad782215316232dbcc916bd5ea3d7fafe0782c1358f7cec6c0db98ccb4846239fc5282e038ee2177570b77acd", 0x4d}], 0x1, 0x0, 0x0, 0x20004840}, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r5, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324693070a7c3f36773d824c32c383ac9d9ea47d98e9596d4b7024fce9decbc540c8a61821b83a05ee97b39c4f733e4c9063dfd5d8d2ed128", 0xc9}], 0x1, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:51 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f16434", 0x71}], 0x3, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:51 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(0x0, 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:51 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgrp(0xffffffffffffffff) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, &(0x7f0000000600)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000240)=[{&(0x7f00000001c0)="22d7a71a162386fc7f773642fc01716f593a1b14b03f6369b2f1015612572a354ad782215316232dbcc916bd5ea3d7fafe0782c1358f7cec6c0db98ccb4846239fc5282e038ee2177570b77acd", 0x4d}], 0x1, 0x0, 0x0, 0x20004840}, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r5, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324693070a7c3f36773d824c32c383ac9d9ea47d98e9596d4b7024fce9decbc540c8a61821b83a05ee97b39c4f733e4c9063dfd5d8d2ed128", 0xc9}], 0x1, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:51 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(0x0, &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r4, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r2, r1}], 0x20, 0x4}, 0x4000001) 02:17:52 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000000980)="d2e9bf7dcf6179277d94eee7264a34baa3a9be934535cb6f366df143013cdf2945082551bf2bc773eb1da3b59113cc7c2a3244f001116c0fcb81c7d341cc937d2806bb5308e1b97ef3fdd13166f45fbfe46a52ab5f1c8934cdb05a023962", 0x5e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324", 0x92}], 0x5, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:52 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f16434", 0x71}], 0x3, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:52 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgrp(0xffffffffffffffff) stat(&(0x7f0000001c00)='./file0\x00', 0x0) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, 0x0) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)="22d7a71a162386fc7f773642fc01716f593a1b14b03f6369b2f1015612572a354ad782215316232dbcc916bd5ea3d7fafe0782c1358f7cec6c0db98ccb4846239fc5282e038ee2177570b77acd", 0x4d}], 0x1, 0x0, 0x0, 0x20004840}, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r4, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37", 0x7e}], 0x4, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r2}], 0x20, 0x4}, 0x4000001) 02:17:52 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(0x0, &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r4, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r2, r1}], 0x20, 0x4}, 0x4000001) 02:17:52 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(0x0, 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:52 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgrp(0xffffffffffffffff) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, &(0x7f0000000600)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000240)=[{&(0x7f00000001c0)="22d7a71a162386fc7f773642fc01716f593a1b14b03f6369b2f1015612572a354ad782215316232dbcc916bd5ea3d7fafe0782c1358f7cec6c0db98ccb4846239fc5282e038ee2177570b77acd", 0x4d}], 0x1, 0x0, 0x0, 0x20004840}, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r5, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324693070a7c3f36773d824c32c383ac9d9ea47d98e9596d4b7024fce9decbc540c8a61821b83a05ee97b39c4f733e4c9063dfd5d8d2ed128", 0xc9}], 0x1, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:52 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000500), 0x0, &(0x7f0000000580)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r4, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r2, r1}], 0x20, 0x4}, 0x4000001) 02:17:52 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f16434", 0x71}], 0x3, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:52 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000000980)="d2e9bf7dcf6179277d94eee7264a34baa3a9be934535cb6f366df143013cdf2945082551bf2bc773eb1da3b59113cc7c2a3244f001116c0fcb81c7d341cc937d2806bb5308e1b97ef3fdd13166f45fbfe46a52ab5f1c8934cdb05a023962", 0x5e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324", 0x92}], 0x5, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:52 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgrp(0xffffffffffffffff) stat(&(0x7f0000001c00)='./file0\x00', 0x0) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, 0x0) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)="22d7a71a162386fc7f773642fc01716f593a1b14b03f6369b2f1015612572a354ad782215316232dbcc916bd5ea3d7fafe0782c1358f7cec6c0db98ccb4846239fc5282e038ee2177570b77acd", 0x4d}], 0x1, 0x0, 0x0, 0x20004840}, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r4, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37", 0x7e}], 0x4, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r2}], 0x20, 0x4}, 0x4000001) 02:17:52 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(0x0, 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:52 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000000980)="d2e9bf7dcf6179277d94eee7264a34baa3a9be934535cb6f366df143013cdf2945082551bf2bc773eb1da3b59113cc7c2a3244f001116c0fcb81c7d341cc937d2806bb5308e1b97ef3fdd13166f45fbfe46a52ab5f1c8934cdb05a023962", 0x5e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324", 0x92}], 0x5, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:53 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000500), 0x0, &(0x7f0000000580)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r4, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r2, r1}], 0x20, 0x4}, 0x4000001) 02:17:53 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgrp(0xffffffffffffffff) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, &(0x7f0000000600)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000240)=[{}], 0x1, 0x0, 0x0, 0x20004840}, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {0x0}], 0x3, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:53 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000000980)="d2e9bf7dcf6179277d94eee7264a34baa3a9be934535cb6f366df143013cdf2945082551bf2bc773eb1da3b59113cc7c2a3244f001116c0fcb81c7d341cc937d2806bb5308e1b97ef3fdd13166f45fbfe46a52ab5f1c8934cdb05a023962", 0x5e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324", 0x92}], 0x5, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:53 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000000980)="d2e9bf7dcf6179277d94eee7264a34baa3a9be934535cb6f366df143013cdf2945082551bf2bc773eb1da3b59113cc7c2a3244f001116c0fcb81c7d341cc937d2806bb5308e1b97ef3fdd13166f45fbfe46a52ab5f1c8934cdb05a023962", 0x5e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324", 0x92}], 0x5, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:53 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379dd", 0x84}], 0x3, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:53 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:53 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:53 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000500), 0x0, &(0x7f0000000580)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r4, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r2, r1}], 0x20, 0x4}, 0x4000001) 02:17:53 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000000980)="d2e9bf7dcf6179277d94eee7264a34baa3a9be934535cb6f366df143013cdf2945082551bf2bc773eb1da3b59113cc7c2a3244f001116c0fcb81c7d341cc937d2806bb5308e1b97ef3fdd13166f45fbfe46a52ab5f1c8934cdb05a023962", 0x5e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324", 0x92}], 0x5, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:53 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379dd", 0x84}], 0x3, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:53 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgrp(0xffffffffffffffff) stat(&(0x7f0000001c00)='./file0\x00', 0x0) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, 0x0) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)="22d7a71a162386fc7f773642fc01716f593a1b14b03f6369b2f1015612572a354ad782215316232dbcc916bd5ea3d7fafe0782c1358f7cec6c0db98ccb4846239fc5282e038ee2177570b77acd", 0x4d}], 0x1, 0x0, 0x0, 0x20004840}, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r4, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324693070a7c3", 0x97}], 0x4, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r2}], 0x20, 0x4}, 0x4000001) 02:17:53 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgrp(0xffffffffffffffff) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, &(0x7f0000000600)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000240)=[{}], 0x1, 0x0, 0x0, 0x20004840}, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324693070a7c3f36773d824c32c383ac9d9ea47d98e9596d4b7024fce9decbc540c8a61821b83a05ee97b39c4f733e4c9063dfd5d8d2ed128", 0xc9}], 0x3, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:53 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:53 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgrp(0xffffffffffffffff) stat(&(0x7f0000001c00)='./file0\x00', 0x0) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, 0x0) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)="22d7a71a162386fc7f773642fc01716f593a1b14b03f6369b2f1015612572a354ad782215316232dbcc916bd5ea3d7fafe0782c1358f7cec6c0db98ccb4846239fc5282e038ee2177570b77acd", 0x4d}], 0x1, 0x0, 0x0, 0x20004840}, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r4, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324693070a7c3", 0x97}], 0x4, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r2}], 0x20, 0x4}, 0x4000001) 02:17:54 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379dd", 0x84}], 0x3, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:54 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000000980)="d2e9bf7dcf6179277d94eee7264a34baa3a9be934535cb6f366df143013cdf2945082551bf2bc773eb1da3b59113cc7c2a3244f001116c0fcb81c7d341cc937d2806bb5308e1b97ef3fdd13166f45fbfe46a52ab5f1c8934cdb05a023962", 0x5e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324", 0x92}], 0x5, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:54 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000500), &(0x7f0000000540), 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r4, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r2, r1}], 0x20, 0x4}, 0x4000001) 02:17:54 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:54 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgrp(0xffffffffffffffff) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, &(0x7f0000000600)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000240)=[{}], 0x1, 0x0, 0x0, 0x20004840}, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324693070a7c3f36773d824c32c383ac9d9ea47d98e9596d4b7024fce9decbc540c8a61821b83a05ee97b39c4f733e4c9063dfd5d8d2ed128", 0xc9}], 0x3, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:54 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000000980)="d2e9bf7dcf6179277d94eee7264a34baa3a9be934535cb6f366df143013cdf2945082551bf2bc773eb1da3b59113cc7c2a3244f001116c0fcb81c7d341cc937d2806bb5308e1b97ef3fdd13166f45fbfe46a52ab5f1c8934cdb05a023962", 0x5e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324", 0x92}], 0x5, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:54 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000500), &(0x7f0000000540), 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r4, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r2, r1}], 0x20, 0x4}, 0x4000001) 02:17:54 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgrp(0xffffffffffffffff) stat(&(0x7f0000001c00)='./file0\x00', 0x0) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, 0x0) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)="22d7a71a162386fc7f773642fc01716f593a1b14b03f6369b2f1015612572a354ad782215316232dbcc916bd5ea3d7fafe0782c1358f7cec6c0db98ccb4846239fc5282e038ee2177570b77acd", 0x4d}], 0x1, 0x0, 0x0, 0x20004840}, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r4, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324693070a7c3", 0x97}], 0x4, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r2}], 0x20, 0x4}, 0x4000001) 02:17:54 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e", 0x8d}], 0x3, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:54 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgrp(0xffffffffffffffff) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, &(0x7f0000000600)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000240)=[{}], 0x1, 0x0, 0x0, 0x20004840}, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324693070a7c3f36773d824c32c383ac9d9ea47d98e9596d4b7024fce9decbc540c8a61821b83a05ee97b39c4f733e4c9063dfd5d8d2ed128", 0xc9}], 0x3, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:54 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:54 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000500), &(0x7f0000000540), 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r4, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r2, r1}], 0x20, 0x4}, 0x4000001) 02:17:54 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e", 0x8d}], 0x3, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:54 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000000980)="d2e9bf7dcf6179277d94eee7264a34baa3a9be934535cb6f366df143013cdf2945082551bf2bc773eb1da3b59113cc7c2a3244f001116c0fcb81c7d341cc937d2806bb5308e1b97ef3fdd13166f45fbfe46a52ab5f1c8934cdb05a023962", 0x5e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324", 0x92}], 0x5, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:54 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000000980)="d2e9bf7dcf6179277d94eee7264a34baa3a9be934535cb6f366df143013cdf2945082551bf2bc773eb1da3b59113cc7c2a3244f001116c0fcb81c7d341cc937d2806bb5308e1b97ef3fdd13166f45fbfe46a52ab5f1c8934cdb05a023962", 0x5e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324", 0x92}], 0x5, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:54 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000500), 0x0, &(0x7f0000000580)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r4, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r2, r1}], 0x20, 0x4}, 0x4000001) 02:17:55 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r4, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r2, r1}], 0x20, 0x4}, 0x4000001) 02:17:55 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324693070a7c3f36773d824c32c383ac9d9ea47d98e9596d4b7024fce9decbc540c8a61821b83a05ee97b39c4f733e4c9063dfd5d8d2ed1", 0xc8}], 0x1, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:55 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000500), 0x0, &(0x7f0000000580)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r4, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r2, r1}], 0x20, 0x4}, 0x4000001) 02:17:55 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:55 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000000980)="d2e9bf7dcf6179277d94eee7264a34baa3a9be934535cb6f366df143013cdf2945082551bf2bc773eb1da3b59113cc7c2a3244f001116c0fcb81c7d341cc937d2806bb5308e1b97ef3fdd13166f45fbfe46a52ab5f1c8934cdb05a023962", 0x5e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324", 0x92}], 0x5, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:55 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e", 0x8d}], 0x3, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:55 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324693070a7c3f36773d824c32c383ac9d9ea47d98e9596d4b7024fce9decbc540c8a61821b83a05ee97b39c4f733e4c9063dfd5d8d2ed1", 0xc8}], 0x1, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:55 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r4, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r2, r1}], 0x20, 0x4}, 0x4000001) 02:17:55 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:55 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgrp(0xffffffffffffffff) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, &(0x7f0000000600)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000240)=[{}], 0x1, 0x0, 0x0, 0x20004840}, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324693070a7c3f36773d824c32c383ac9d9ea47d98e9596d4b7024fce9decbc540c8a61821b83a05ee97b39c4f733e4c9063dfd5d8d2ed1", 0xc8}], 0x4, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:55 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r4, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r2, r1}], 0x20, 0x4}, 0x4000001) 02:17:55 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000000980)="d2e9bf7dcf6179277d94eee7264a34baa3a9be934535cb6f366df143013cdf2945082551bf2bc773eb1da3b59113cc7c2a3244f001116c0fcb81c7d341cc937d2806bb5308e1b97ef3fdd13166f45fbfe46a52ab5f1c8934cdb05a023962", 0x5e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324", 0x92}], 0x5, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:56 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324", 0x92}], 0x3, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:56 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:56 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:56 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000000980)="d2e9bf7dcf6179277d94eee7264a34baa3a9be934535cb6f366df143013cdf2945082551bf2bc773eb1da3b59113cc7c2a3244f001116c0fcb81c7d341cc937d2806bb5308e1b97ef3fdd13166f45fbfe46a52ab5f1c8934cdb05a023962", 0x5e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324", 0x92}], 0x5, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:56 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, 0x0) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r4, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r2, r1}], 0x20, 0x4}, 0x4000001) 02:17:56 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:56 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, 0x0) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r4, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r2, r1}], 0x20, 0x4}, 0x4000001) 02:17:56 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r5, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:56 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324", 0x92}], 0x3, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:56 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:56 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000000980)="d2e9bf7dcf6179277d94eee7264a34baa3a9be934535cb6f366df143013cdf2945082551bf2bc773eb1da3b59113cc7c2a3244f001116c0fcb81c7d341cc937d2806bb5308e1b97ef3fdd13166f45fbfe46a52ab5f1c8934cdb05a023962", 0x5e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324", 0x92}], 0x5, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:56 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r5, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:56 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:56 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324", 0x92}], 0x3, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:56 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000000980)="d2e9bf7dcf6179277d94eee7264a34baa3a9be934535cb6f366df143013cdf2945082551bf2bc773eb1da3b59113cc7c2a3244f001116c0fcb81c7d341cc937d2806bb5308e1b97ef3fdd13166f45fbfe46a52ab5f1c8934cdb05a023962", 0x5e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324", 0x92}], 0x5, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:56 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:56 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, 0x0) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r4, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r2, r1}], 0x20, 0x4}, 0x4000001) 02:17:56 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000000980)="d2e9bf7dcf6179277d94eee7264a34baa3a9be934535cb6f366df143013cdf2945082551bf2bc773eb1da3b59113cc7c2a3244f001116c0fcb81c7d341cc937d2806bb5308e1b97ef3fdd13166f45fbfe46a52ab5f1c8934cdb05a023962", 0x5e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324", 0x92}], 0x5, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:56 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d3246930", 0x94}], 0x3, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:56 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000000980)="d2e9bf7dcf6179277d94eee7264a34baa3a9be934535cb6f366df143013cdf2945082551bf2bc773eb1da3b59113cc7c2a3244f001116c0fcb81c7d341cc937d2806bb5308e1b97ef3fdd13166f45fbfe46a52ab5f1c8934cdb05a023962", 0x5e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324", 0x92}], 0x5, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:56 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgrp(0xffffffffffffffff) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, &(0x7f0000000600)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000240)=[{}], 0x1, 0x0, 0x0, 0x20004840}, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324693070a7c3f36773d824c32c383ac9d9ea47d98e9596d4b7024fce9decbc540c8a61821b83a05ee97b39c4", 0xbd}], 0x4, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:57 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r4, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r2, r1}], 0x20, 0x4}, 0x4000001) 02:17:57 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)) fstat(r1, &(0x7f0000001d40)) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r3, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, 0x0, 0x4000001) 02:17:57 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000000980)="d2e9bf7dcf6179277d94eee7264a34baa3a9be934535cb6f366df143013cdf2945082551bf2bc773eb1da3b59113cc7c2a3244f001116c0fcb81c7d341cc937d2806bb5308e1b97ef3fdd13166f45fbfe46a52ab5f1c8934cdb05a023962", 0x5e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324", 0x92}], 0x5, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:57 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d3246930", 0x94}], 0x3, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:57 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000000980)="d2e9bf7dcf6179277d94eee7264a34baa3a9be934535cb6f366df143013cdf2945082551bf2bc773eb1da3b59113cc7c2a3244f001116c0fcb81c7d341cc937d2806bb5308e1b97ef3fdd13166f45fbfe46a52ab5f1c8934cdb05a023962", 0x5e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324", 0x92}], 0x5, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:57 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)) fstat(r1, &(0x7f0000001d40)) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r3, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, 0x0, 0x4000001) 02:17:57 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d3246930", 0x94}], 0x3, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:57 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r4, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r2, r1}], 0x20, 0x4}, 0x4000001) 02:17:57 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324693070a7c3f36773d824c32c383ac9d9ea47d98e9596d4b7024fce9decbc540c8a61821b83a05ee97b39c4f733e4c906", 0xc2}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:58 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)) fstat(r1, &(0x7f0000001d40)) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r3, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, 0x0, 0x4000001) 02:17:58 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324693070", 0x95}], 0x3, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:58 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgrp(0xffffffffffffffff) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, &(0x7f0000000600)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000240)=[{}], 0x1, 0x0, 0x0, 0x20004840}, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324693070a7c3f36773d824c32c383ac9d9ea47d98e9596d4b7024fce9decbc540c8a61821b83a05ee97b39c4", 0xbd}], 0x4, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:58 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000000980)="d2e9bf7dcf6179277d94eee7264a34baa3a9be934535cb6f366df143013cdf2945082551bf2bc773eb1da3b59113cc7c2a3244f001116c0fcb81c7d341cc937d2806bb5308e1b97ef3fdd13166f45fbfe46a52ab5f1c8934cdb05a023962", 0x5e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324", 0x92}], 0x5, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:58 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324693070a7c3f36773d824c32c383ac9d9ea47d98e9596d4b7024fce9decbc540c8a61821b83a05ee97b39c4f733e4c906", 0xc2}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:58 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r4, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r2, r1}], 0x20, 0x4}, 0x4000001) 02:17:58 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000000980)="d2e9bf7dcf6179277d94eee7264a34baa3a9be934535cb6f366df143013cdf2945082551bf2bc773eb1da3b59113cc7c2a3244f001116c0fcb81c7d341cc937d2806bb5308e1b97ef3fdd13166f45fbfe46a52ab5f1c8934cdb05a023962", 0x5e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324", 0x92}], 0x5, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:58 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:58 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324693070", 0x95}], 0x3, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:58 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324693070a7c3f36773d824c32c383ac9d9ea47d98e9596d4b7024fce9decbc540c8a61821b83a05ee97b39c4f733e4c906", 0xc2}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:58 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgrp(0xffffffffffffffff) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, &(0x7f0000000600)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000240)=[{}], 0x1, 0x0, 0x0, 0x20004840}, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324693070a7c3f36773d824c32c383ac9d9ea47d98e9596d4b7024fce9decbc540c8a61821b83a05ee97b39c4", 0xbd}], 0x4, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:58 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r4, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r2, r1}], 0x20, 0x4}, 0x4000001) 02:17:58 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000000980)="d2e9bf7dcf6179277d94eee7264a34baa3a9be934535cb6f366df143013cdf2945082551bf2bc773eb1da3b59113cc7c2a3244f001116c0fcb81c7d341cc937d2806bb5308e1b97ef3fdd13166f45fbfe46a52ab5f1c8934cdb05a023962", 0x5e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324", 0x92}], 0x5, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:58 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:58 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)) fstat(r1, &(0x7f0000001d40)) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r3, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, 0x0, 0x4000001) 02:17:58 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324693070", 0x95}], 0x3, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:58 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r4, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r2, r1}], 0x20, 0x4}, 0x4000001) 02:17:58 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r4, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r2, r1}], 0x20, 0x4}, 0x4000001) 02:17:58 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000000980)="d2e9bf7dcf6179277d94eee7264a34baa3a9be934535cb6f366df143013cdf2945082551bf2bc773eb1da3b59113cc7c2a3244f001116c0fcb81c7d341cc937d2806bb5308e1b97ef3fdd13166f45fbfe46a52ab5f1c8934cdb05a023962", 0x5e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324", 0x92}], 0x5, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:58 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:58 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r4, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r2, r1}], 0x20, 0x4}, 0x4000001) 02:17:58 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)) fstat(r1, &(0x7f0000001d40)) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r3, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, 0x0, 0x4000001) 02:17:58 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324693070a7", 0x96}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:58 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r4, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r2, r1}], 0x20, 0x4}, 0x4000001) 02:17:59 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:59 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r4, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r2, r1}], 0x20, 0x4}, 0x4000001) 02:17:59 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000000980)="d2e9bf7dcf6179277d94eee7264a34baa3a9be934535cb6f366df143013cdf2945082551bf2bc773eb1da3b59113cc7c2a3244f001116c0fcb81c7d341cc937d2806bb5308e1b97ef3fdd13166f45fbfe46a52ab5f1c8934cdb05a023962", 0x5e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324", 0x92}], 0x5, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:59 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324693070a7", 0x96}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:59 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r4, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r2, r1}], 0x20, 0x4}, 0x4000001) 02:17:59 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:59 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:59 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000000980)="d2e9bf7dcf6179277d94eee7264a34baa3a9be934535cb6f366df143013cdf2945082551bf2bc773eb1da3b59113cc7c2a3244f001116c0fcb81c7d341cc937d2806bb5308e1b97ef3fdd13166f45fbfe46a52ab5f1c8934cdb05a023962", 0x5e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324", 0x92}], 0x5, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:59 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:59 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:59 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r4, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r2, r1}], 0x20, 0x4}, 0x4000001) 02:17:59 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgrp(0xffffffffffffffff) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, 0x0) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, &(0x7f0000000600)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000240)=[{&(0x7f00000001c0)="22d7a71a162386fc7f773642fc01716f593a1b14b03f6369b2f1015612572a354ad782215316232dbcc916bd5ea3d7fafe0782c1358f7cec6c0db98ccb4846239fc5282e038ee2177570b77acd", 0x4d}], 0x1, 0x0, 0x0, 0x20004840}, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r4, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324693070a7c3f36773d824c32c383ac9d9ea47d98e9596d4b7024fce9decbc540c8a61821b83a05ee97b39c4f733e4c9063dfd5d8d2ed128", 0xc9}], 0x1, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r2}], 0x20, 0x4}, 0x4000001) 02:17:59 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324693070a7", 0x96}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:59 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000000980)="d2e9bf7dcf6179277d94eee7264a34baa3a9be934535cb6f366df143013cdf2945082551bf2bc773eb1da3b59113cc7c2a3244f001116c0fcb81c7d341cc937d2806bb5308e1b97ef3fdd13166f45fbfe46a52ab5f1c8934cdb05a023962", 0x5e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324", 0x92}], 0x5, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:59 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgrp(0xffffffffffffffff) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, 0x0) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, &(0x7f0000000600)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000240)=[{&(0x7f00000001c0)="22d7a71a162386fc7f773642fc01716f593a1b14b03f6369b2f1015612572a354ad782215316232dbcc916bd5ea3d7fafe0782c1358f7cec6c0db98ccb4846239fc5282e038ee2177570b77acd", 0x4d}], 0x1, 0x0, 0x0, 0x20004840}, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r4, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324693070a7c3f36773d824c32c383ac9d9ea47d98e9596d4b7024fce9decbc540c8a61821b83a05ee97b39c4f733e4c9063dfd5d8d2ed128", 0xc9}], 0x1, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r2}], 0x20, 0x4}, 0x4000001) 02:17:59 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:17:59 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000000980)="d2e9bf7dcf6179277d94eee7264a34baa3a9be934535cb6f366df143013cdf2945082551bf2bc773eb1da3b59113cc7c2a3244f001116c0fcb81c7d341cc937d2806bb5308e1b97ef3fdd13166f45fbfe46a52ab5f1c8934cdb05a023962", 0x5e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324", 0x92}], 0x5, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:18:00 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, 0x0, 0x0, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:18:00 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgrp(0xffffffffffffffff) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, 0x0) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, &(0x7f0000000600)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000240)=[{&(0x7f00000001c0)="22d7a71a162386fc7f773642fc01716f593a1b14b03f6369b2f1015612572a354ad782215316232dbcc916bd5ea3d7fafe0782c1358f7cec6c0db98ccb4846239fc5282e038ee2177570b77acd", 0x4d}], 0x1, 0x0, 0x0, 0x20004840}, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r4, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324693070a7c3f36773d824c32c383ac9d9ea47d98e9596d4b7024fce9decbc540c8a61821b83a05ee97b39c4f733e4c9063dfd5d8d2ed128", 0xc9}], 0x1, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r2}], 0x20, 0x4}, 0x4000001) 02:18:00 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:18:00 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r4, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r2, r1}], 0x20, 0x4}, 0x4000001) 02:18:00 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r4, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r2, r1}], 0x20, 0x4}, 0x4000001) 02:18:00 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r4, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r2, r1}], 0x20, 0x4}, 0x4000001) 02:18:00 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(0x0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000000980)="d2e9bf7dcf6179277d94eee7264a34baa3a9be934535cb6f366df143013cdf2945082551bf2bc773eb1da3b59113cc7c2a3244f001116c0fcb81c7d341cc937d2806bb5308e1b97ef3fdd13166f45fbfe46a52ab5f1c8934cdb05a023962", 0x5e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324693070a7", 0x96}], 0x5, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:18:00 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:18:00 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, 0x0, 0x0, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:18:00 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000000980)="d2e9bf7dcf6179277d94eee7264a34baa3a9be934535cb6f366df143013cdf2945082551bf2bc773eb1da3b59113cc7c2a3244f001116c0fcb81c7d341cc937d2806bb5308e1b97ef3fdd13166f45fbfe46a52ab5f1c8934cdb05a023962", 0x5e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324", 0x92}], 0x5, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:18:00 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r4, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r2, r1}], 0x20, 0x4}, 0x4000001) 02:18:00 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r3, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r2, r1}], 0x20, 0x4}, 0x4000001) 02:18:00 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000000980)="d2e9bf7dcf6179277d94eee7264a34baa3a9be934535cb6f366df143013cdf2945082551bf2bc773eb1da3b59113cc7c2a3244f001116c0fcb81c7d341cc937d2806bb5308e1b97ef3fdd13166f45fbfe46a52ab5f1c8934cdb05a023962", 0x5e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324", 0x92}], 0x5, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:18:00 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:18:00 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r4, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r2, r1}], 0x20, 0x4}, 0x4000001) 02:18:00 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r3, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r2, r1}], 0x20, 0x4}, 0x4000001) 02:18:00 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:18:00 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, 0x0, 0x0, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:18:00 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r3, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r2, r1}], 0x20, 0x4}, 0x4000001) 02:18:00 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r4, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r2, r1}], 0x20, 0x4}, 0x4000001) 02:18:00 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}], 0x1, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:18:00 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r5, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000000980)="d2e9bf7dcf6179277d94eee7264a34baa3a9be934535cb6f366df143013cdf2945082551bf2bc773eb1da3b59113cc7c2a3244f001116c0fcb81c7d341cc937d2806bb5308e1b97ef3fdd13166f45fbfe46a52ab5f1c8934cdb05a023962", 0x5e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324", 0x92}], 0x5, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r3, r2}], 0x20, 0x4}, 0x4000001) 02:18:00 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f0000001a00)}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:18:00 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:18:00 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r4, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r2, r1}], 0x20, 0x4}, 0x4000001) 02:18:01 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}], 0x1, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:18:01 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324693070a7c3f36773d824c32c383ac9d9ea47d98e9596d4b7024fce9decbc540c8a61821b83a05ee97b39c4f733e4c906", 0xc2}], 0x3, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:18:01 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:18:01 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r4, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r2, r1}], 0x20, 0x4}, 0x4000001) 02:18:01 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r5, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000000980)="d2e9bf7dcf6179277d94eee7264a34baa3a9be934535cb6f366df143013cdf2945082551bf2bc773eb1da3b59113cc7c2a3244f001116c0fcb81c7d341cc937d2806bb5308e1b97ef3fdd13166f45fbfe46a52ab5f1c8934cdb05a023962", 0x5e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324", 0x92}], 0x5, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r3, r2}], 0x20, 0x4}, 0x4000001) 02:18:01 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f0000001a00)}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:18:01 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}], 0x1, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:18:01 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r4, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r2, r1}], 0x20, 0x4}, 0x4000001) 02:18:01 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgrp(0xffffffffffffffff) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, &(0x7f0000000600)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000240)=[{}], 0x1, 0x0, 0x0, 0x20004840}, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000000980)="d2e9bf7dcf6179277d94eee7264a34baa3a9be934535cb6f366df143013cdf2945082551bf2bc773eb1da3b59113cc7c2a3244f001116c0fcb81c7d341cc937d2806bb5308e1b97ef3fdd13166f45fbfe46a52ab5f1c8934cdb05a023962", 0x5e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324693070a7c3f36773d824c32c383ac9d9ea47d98e9596d4b7024fce9decbc540c8a61821b83a05ee97b39c4", 0xbd}], 0x5, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:18:01 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r5, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000000980)="d2e9bf7dcf6179277d94eee7264a34baa3a9be934535cb6f366df143013cdf2945082551bf2bc773eb1da3b59113cc7c2a3244f001116c0fcb81c7d341cc937d2806bb5308e1b97ef3fdd13166f45fbfe46a52ab5f1c8934cdb05a023962", 0x5e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324", 0x92}], 0x5, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r3, r2}], 0x20, 0x4}, 0x4000001) 02:18:01 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f0000001a00)}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:18:01 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324693070a7c3f36773d824c32c383ac9d9ea47d98e9596d4b7024fce9decbc540c8a61821b83a05ee97b39c4f733e4c906", 0xc2}], 0x3, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:18:01 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r5, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000000980)="d2e9bf7dcf6179277d94eee7264a34baa3a9be934535cb6f366df143013cdf2945082551bf2bc773eb1da3b59113cc7c2a3244f001116c0fcb81c7d341cc937d2806bb5308e1b97ef3fdd13166f45fbfe46a52ab5f1c8934cdb05a023962", 0x5e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324693070a7", 0x96}], 0x5, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r3, r2}], 0x20, 0x4}, 0x4000001) 02:18:01 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{0x0}], 0x1, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:18:01 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324693070a7c3f36773d824c32c383ac9d9ea47d98e9596d4b7024fce9decbc540c8a61821b83a05ee97b39c4f733e4c906", 0xc2}], 0x3, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:18:01 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r4, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r2, r1}], 0x20, 0x4}, 0x4000001) 02:18:01 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r5, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000000980)="d2e9bf7dcf6179277d94eee7264a34baa3a9be934535cb6f366df143013cdf2945082551bf2bc773eb1da3b59113cc7c2a3244f001116c0fcb81c7d341cc937d2806bb5308e1b97ef3fdd13166f45fbfe46a52ab5f1c8934cdb05a023962", 0x5e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324", 0x92}], 0x5, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r3, 0x0, r2}], 0x20, 0x4}, 0x4000001) 02:18:01 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b74", 0x4b}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:18:01 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r5, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000000980)="d2e9bf7dcf6179277d94eee7264a34baa3a9be934535cb6f366df143013cdf2945082551bf2bc773eb1da3b59113cc7c2a3244f001116c0fcb81c7d341cc937d2806bb5308e1b97ef3fdd13166f45fbfe46a52ab5f1c8934cdb05a023962", 0x5e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324693070a7", 0x96}], 0x5, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r3, r2}], 0x20, 0x4}, 0x4000001) [ 573.316498] ================================================================== [ 573.324104] BUG: KASAN: use-after-free in disk_unblock_events+0x4b/0x50 [ 573.331227] Read of size 8 at addr ffff8881d6e22768 by task blkid/26347 [ 573.338385] [ 573.341019] CPU: 1 PID: 26347 Comm: blkid Not tainted 4.14.106+ #31 [ 573.347725] Call Trace: [ 573.350422] dump_stack+0xb9/0x10e [ 573.353992] ? disk_unblock_events+0x4b/0x50 [ 573.358722] print_address_description+0x60/0x226 02:18:02 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f0000001a00)}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:18:02 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgrp(0xffffffffffffffff) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, &(0x7f0000000600)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000240)=[{}], 0x1, 0x0, 0x0, 0x20004840}, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000000980)="d2e9bf7dcf6179277d94eee7264a34baa3a9be934535cb6f366df143013cdf2945082551bf2bc773eb1da3b59113cc7c2a3244f001116c0fcb81c7d341cc937d2806bb5308e1b97ef3fdd13166f45fbfe46a52ab5f1c8934cdb05a023962", 0x5e}, {&(0x7f0000001a00)}], 0x5, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) [ 573.364023] ? disk_unblock_events+0x4b/0x50 [ 573.368469] kasan_report.cold+0x88/0x2a5 [ 573.373629] ? disk_unblock_events+0x4b/0x50 [ 573.378171] ? __blkdev_get+0x68f/0xf90 [ 573.382347] ? __blkdev_put+0x6d0/0x6d0 [ 573.401416] ? fsnotify+0x8b0/0x1150 [ 573.405270] ? blkdev_get+0x97/0x8b0 [ 573.409016] ? bd_acquire+0x171/0x2c0 [ 573.412857] ? bd_may_claim+0xd0/0xd0 02:18:02 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgrp(0xffffffffffffffff) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)) fstat(r1, &(0x7f0000001d40)) fcntl$getownex(r1, 0x10, 0x0) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, &(0x7f0000000600)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000240)=[{&(0x7f00000001c0)="22d7a71a162386fc7f773642fc01716f593a1b14b03f6369b2f1015612572a354ad782215316232dbcc916bd5ea3d7fafe0782c1358f7cec6c0db98ccb4846239fc5282e038ee2177570b77acd", 0x4d}], 0x1, 0x0, 0x0, 0x20004840}, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r3, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324693070a7c3f36773d824c32c383ac9d9ea47d98e9596d4b7024fce9decbc540c8a61821b83a05ee97b39c4f733e4c9063dfd5d8d2ed128", 0xc9}], 0x1}, 0x4000001) 02:18:02 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgrp(0xffffffffffffffff) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, 0x0) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, &(0x7f0000000600)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000240)=[{&(0x7f00000001c0)="22d7a71a162386fc7f773642fc01716f593a1b14b03f6369b2f1015612572a354ad782215316232dbcc916bd5ea3d7fafe0782c1358f7cec6c0db98ccb4846239fc5282e038ee2177570b77acd", 0x4d}], 0x1, 0x0, 0x0, 0x20004840}, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r5, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324693070a7c3f36773d824c32c383ac9d9ea47d98e9596d4b7024fce9decbc540c8a61821b83a05ee97b39c4f733e4c9063dfd5d8d2ed128", 0xc9}], 0x1, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r3, r2}], 0x20, 0x4}, 0x4000001) [ 573.416770] ? lock_downgrade+0x5d0/0x5d0 [ 573.421335] ? lock_acquire+0x10f/0x380 [ 573.425624] ? bd_acquire+0x21/0x2c0 [ 573.429386] ? blkdev_open+0x1cc/0x250 [ 573.434897] ? security_file_open+0x88/0x190 [ 573.440437] ? do_dentry_open+0x41b/0xd60 [ 573.444702] ? bd_acquire+0x2c0/0x2c0 [ 573.448621] ? vfs_open+0x105/0x230 [ 573.452316] ? path_openat+0xb6b/0x2b70 [ 573.456324] ? path_mountpoint+0x9a0/0x9a0 [ 573.460600] ? trace_hardirqs_on+0x10/0x10 02:18:02 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgrp(0xffffffffffffffff) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, 0x0) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, &(0x7f0000000600)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000240)=[{&(0x7f00000001c0)="22d7a71a162386fc7f773642fc01716f593a1b14b03f6369b2f1015612572a354ad782215316232dbcc916bd5ea3d7fafe0782c1358f7cec6c0db98ccb4846239fc5282e038ee2177570b77acd", 0x4d}], 0x1, 0x0, 0x0, 0x20004840}, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r5, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324693070a7c3f36773d824c32c383ac9d9ea47d98e9596d4b7024fce9decbc540c8a61821b83a05ee97b39c4f733e4c9063dfd5d8d2ed1", 0xc8}], 0x1, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r3, r2}], 0x20, 0x4}, 0x4000001) [ 573.464953] ? trace_hardirqs_on+0x10/0x10 [ 573.469345] ? do_filp_open+0x1a1/0x280 [ 573.473531] ? may_open_dev+0xe0/0xe0 [ 573.477472] ? lock_downgrade+0x5d0/0x5d0 [ 573.481668] ? lock_acquire+0x10f/0x380 [ 573.485664] ? __alloc_fd+0x3f/0x490 [ 573.489462] ? _raw_spin_unlock+0x29/0x40 [ 573.493721] ? __alloc_fd+0x1bf/0x490 [ 573.499559] ? do_sys_open+0x2ca/0x590 [ 573.503644] ? filp_open+0x60/0x60 [ 573.507383] ? __sched_text_start+0x8/0x8 [ 573.511699] ? do_syscall_64+0x43/0x4b0 [ 573.515691] ? do_sys_open+0x590/0x590 [ 573.519773] ? do_syscall_64+0x19b/0x4b0 [ 573.523890] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 573.529479] [ 573.531121] Allocated by task 26330: [ 573.534851] kasan_kmalloc.part.0+0x4f/0xd0 [ 573.539281] kmem_cache_alloc_trace+0x126/0x310 [ 573.544005] alloc_disk_node+0x5b/0x3d0 [ 573.548084] [ 573.549717] Freed by task 26347: [ 573.553099] kasan_slab_free+0xb0/0x190 [ 573.557081] kfree+0xf5/0x310 [ 573.560181] device_release+0xf4/0x1a0 [ 573.564138] [ 573.565778] The buggy address belongs to the object at ffff8881d6e22200 [ 573.565778] which belongs to the cache kmalloc-2048 of size 2048 [ 573.578746] The buggy address is located 1384 bytes inside of [ 573.578746] 2048-byte region [ffff8881d6e22200, ffff8881d6e22a00) [ 573.591039] The buggy address belongs to the page: [ 573.596056] page:ffffea00075b8800 count:1 mapcount:0 mapping: (null) index:0xffff8881d6e23b80 compound_mapcount: 0 [ 573.607553] flags: 0x4000000000008100(slab|head) [ 573.612326] raw: 4000000000008100 0000000000000000 ffff8881d6e23b80 00000001800f000d [ 573.620564] raw: ffffea000751b000 0000000400000004 ffff8881da802800 0000000000000000 [ 573.630383] page dumped because: kasan: bad access detected [ 573.639592] [ 573.641236] Memory state around the buggy address: [ 573.646757] ffff8881d6e22600: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 573.654320] ffff8881d6e22680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb 02:18:02 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgrp(0xffffffffffffffff) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, 0x0) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, &(0x7f0000000600)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000240)=[{&(0x7f00000001c0)="22d7a71a162386fc7f773642fc01716f593a1b14b03f6369b2f1015612572a354ad782215316232dbcc916bd5ea3d7fafe0782c1358f7cec6c0db98ccb4846239fc5282e038ee2177570b77acd", 0x4d}], 0x1, 0x0, 0x0, 0x20004840}, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r5, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324693070a7c3f36773d824c32c383ac9d9ea47d98e9596d4b7024fce9decbc540c8a61821b83a05ee97b39c4f733e4c9063dfd5d8d2ed1", 0xc8}], 0x1, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r3, r2}], 0x20, 0x4}, 0x4000001) 02:18:02 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{0x0}], 0x1, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:18:02 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgrp(0xffffffffffffffff) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, 0x0) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, &(0x7f0000000600)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000240)=[{&(0x7f00000001c0)="22d7a71a162386fc7f773642fc01716f593a1b14b03f6369b2f1015612572a354ad782215316232dbcc916bd5ea3d7fafe0782c1358f7cec6c0db98ccb4846239fc5282e038ee2177570b77acd", 0x4d}], 0x1, 0x0, 0x0, 0x20004840}, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r5, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324693070a7c3f36773d824c32c383ac9d9ea47d98e9596d4b7024fce9decbc540c8a61821b83a05ee97b39c4f733e4c9063dfd5d8d2ed1", 0xc8}], 0x1, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r3, r2}], 0x20, 0x4}, 0x4000001) 02:18:02 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgrp(0xffffffffffffffff) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, 0x0) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, &(0x7f0000000600)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000240)=[{&(0x7f00000001c0)="22d7a71a162386fc7f773642fc01716f593a1b14b03f6369b2f1015612572a354ad782215316232dbcc916bd5ea3d7fafe0782c1358f7cec6c0db98ccb4846239fc5282e038ee2177570b77acd", 0x4d}], 0x1, 0x0, 0x0, 0x20004840}, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r5, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324693070a7c3f36773d824c32c383ac9d9ea47d98e9596d4b7024fce9decbc540c8a61821b83a05ee97b39c4f733e4c9063dfd5d8d2ed128", 0xc9}], 0x1, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r3, r2}], 0x20, 0x4}, 0x4000001) 02:18:02 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r4, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, 0x0, r2, r1}], 0x20, 0x4}, 0x4000001) 02:18:02 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r5, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000000980)="d2e9bf7dcf6179277d94eee7264a34baa3a9be934535cb6f366df143013cdf2945082551bf2bc773eb1da3b59113cc7c2a3244f001116c0fcb81c7d341cc937d2806bb5308e1b97ef3fdd13166f45fbfe46a52ab5f1c8934cdb05a023962", 0x5e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324", 0x92}], 0x5, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r3, 0x0, r2}], 0x20, 0x4}, 0x4000001) 02:18:02 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b74", 0x4b}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) [ 573.662829] >ffff8881d6e22700: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 573.670755] ^ [ 573.678759] ffff8881d6e22780: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 573.686136] ffff8881d6e22800: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 573.694080] ================================================================== [ 573.701526] Disabling lock debugging due to kernel taint 02:18:02 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r5, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000000980)="d2e9bf7dcf6179277d94eee7264a34baa3a9be934535cb6f366df143013cdf2945082551bf2bc773eb1da3b59113cc7c2a3244f001116c0fcb81c7d341cc937d2806bb5308e1b97ef3fdd13166f45fbfe46a52ab5f1c8934cdb05a023962", 0x5e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324", 0x92}], 0x5, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r3, 0x0, r2}], 0x20, 0x4}, 0x4000001) [ 573.791793] Kernel panic - not syncing: panic_on_warn set ... [ 573.791793] [ 573.799373] CPU: 0 PID: 26347 Comm: blkid Tainted: G B 4.14.106+ #31 [ 573.807037] Call Trace: [ 573.809641] dump_stack+0xb9/0x10e [ 573.813192] panic+0x1d9/0x3c2 [ 573.816536] ? add_taint.cold+0x16/0x16 [ 573.820535] ? disk_unblock_events+0x4b/0x50 [ 573.825244] ? ___preempt_schedule+0x16/0x18 [ 573.829669] ? disk_unblock_events+0x4b/0x50 [ 573.834302] kasan_end_report+0x43/0x49 [ 573.838308] kasan_report.cold+0xa4/0x2a5 [ 573.842467] ? disk_unblock_events+0x4b/0x50 [ 573.846906] ? __blkdev_get+0x68f/0xf90 [ 573.851044] ? __blkdev_put+0x6d0/0x6d0 [ 573.855061] ? fsnotify+0x8b0/0x1150 [ 573.858877] ? blkdev_get+0x97/0x8b0 [ 573.862613] ? bd_acquire+0x171/0x2c0 [ 573.866530] ? bd_may_claim+0xd0/0xd0 [ 573.870341] ? lock_downgrade+0x5d0/0x5d0 [ 573.874536] ? lock_acquire+0x10f/0x380 [ 573.878540] ? bd_acquire+0x21/0x2c0 [ 573.882272] ? blkdev_open+0x1cc/0x250 [ 573.886325] ? security_file_open+0x88/0x190 [ 573.891283] ? do_dentry_open+0x41b/0xd60 [ 573.895545] ? bd_acquire+0x2c0/0x2c0 [ 573.899843] ? vfs_open+0x105/0x230 [ 573.903573] ? path_openat+0xb6b/0x2b70 [ 573.907664] ? path_mountpoint+0x9a0/0x9a0 [ 573.911964] ? trace_hardirqs_on+0x10/0x10 [ 573.916535] ? trace_hardirqs_on+0x10/0x10 [ 573.920999] ? do_filp_open+0x1a1/0x280 [ 573.925376] ? may_open_dev+0xe0/0xe0 [ 573.929284] ? lock_downgrade+0x5d0/0x5d0 [ 573.933603] ? lock_acquire+0x10f/0x380 [ 573.937604] ? __alloc_fd+0x3f/0x490 02:18:02 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{0x0}], 0x1, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:18:02 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r5, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000000980)="d2e9bf7dcf6179277d94eee7264a34baa3a9be934535cb6f366df143013cdf2945082551bf2bc773eb1da3b59113cc7c2a3244f001116c0fcb81c7d341cc937d2806bb5308e1b97ef3fdd13166f45fbfe46a52ab5f1c8934cdb05a023962", 0x5e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324", 0x92}], 0x5, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r3, r2}], 0x20, 0x4}, 0x4000001) 02:18:02 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r5, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000000980)="d2e9bf7dcf6179277d94eee7264a34baa3a9be934535cb6f366df143013cdf2945082551bf2bc773eb1da3b59113cc7c2a3244f001116c0fcb81c7d341cc937d2806bb5308e1b97ef3fdd13166f45fbfe46a52ab5f1c8934cdb05a023962", 0x5e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324", 0x92}], 0x5, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r3, r2}], 0x20, 0x4}, 0x4000001) 02:18:02 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{0x0}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) 02:18:02 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r5, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000000700)="98866dda3da42cb5509f21f79079b21e876ef965662caaca4984e13c49bfa27b7b1e442e00535b4f79e3d2af4cbc3de8cec530bf20a50dba1e8bb354c20edc1eb7c2af3c7ad6b29a5c8b47c64979630d837fb5ac7da7d8a10bd2661c636f80e90649a16ddc6c6c554300425ef086773fcb80dc8488b13408df3f43e64d2a67899debd70f8a2a2b99f6345cc16cad8b97868e5cf16eb37c361481aaca800016c0fb51ccb205255607f992d5ef81ea4df646569f7695090a9bfa741d2a", 0xbc}, {&(0x7f00000007c0)="04155046d1af8451f20ad3cadf30e433c3a77267d1edbc6b3f500012533bc55af31d19cfb14531dda256fb8e2d450482ecfc270bcccf1f2df7e0d8322411c78b3d0a075873a4ba7d8fbc3ac9c2316ff072c5f76958e9cb148660786ec6598035b10b5e51c8d07491c80edc7a55abafb0ccf24f1ab351808d9d5261d9b1dce30c4c11ab7275241a81da3eed6b7d1087587ba492d127551182a2ab9bedae549dcb99e75418c75206e7e113227525c8d63041d85a337a550b88568f7b053640f2483d8574400ca55d6719c4d7e7691f3254cc6e4f7f9d69539482ba563b966dbad0633ea0a580786a32f4", 0xe9}, {&(0x7f0000000900)="ab3bf05a50dc0f010b166ed848094fa52d1ab634257868a9b699c2c6d4b1b8d3c0010a96f187d786d54d9cf15fac969e13255384f8ecd676f6b30532dbf6cacd13fe3b5e2405b9c5d9931e7b9eb93a1cac67a614b40442b0e55c58b80b8a0a9475fe26ec7289f82975dc374e6edb3f862439f6f885e9d3831eb761553955", 0x7e}, {&(0x7f0000000980)="d2e9bf7dcf6179277d94eee7264a34baa3a9be934535cb6f366df143013cdf2945082551bf2bc773eb1da3b59113cc7c2a3244f001116c0fcb81c7d341cc937d2806bb5308e1b97ef3fdd13166f45fbfe46a52ab5f1c8934cdb05a023962", 0x5e}, {&(0x7f0000001a00)="880aacfecd421443f5cd38926ab3413a06ce4f6dba49f83fcabf3b34e60262a6b00363e3962a19b697a689744717db52dd2bfe0e17a877d219d0d12f91a1b69331c649c5225a46607b0b747e9e230cf50662e44c31013b63ca1be21baba99e60d6d125200b5f3c43afdb6e507517f164347a47a02d32dc8d00b9c4e42d37a453e11379ddbfcb9cc85919ccd84e817743d324", 0x92}], 0x5, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r3, r2}], 0x20, 0x4}, 0x4000001) 02:18:02 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000480)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) sendmsg$unix(r0, 0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000008c0)) setresuid(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) sendfile(r6, 0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001b00)=[{0x0}, {0x0}], 0x2, &(0x7f0000000000)=[@cred={0x20, 0x1, 0x2, r4, r3, r2}], 0x20, 0x4}, 0x4000001) [ 573.941519] ? _raw_spin_unlock+0x29/0x40 [ 573.946028] ? __alloc_fd+0x1bf/0x490 [ 573.950466] ? do_sys_open+0x2ca/0x590 [ 573.954378] ? filp_open+0x60/0x60 [ 573.958743] ? __sched_text_start+0x8/0x8 [ 573.962919] ? do_syscall_64+0x43/0x4b0 [ 573.966910] ? do_sys_open+0x590/0x590 [ 573.971094] ? do_syscall_64+0x19b/0x4b0 [ 573.975247] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 573.982321] Kernel Offset: 0xa00000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff) [ 573.993690] Rebooting in 86400 seconds..