INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.111' (ECDSA) to the list of known hosts. 2019/03/29 20:52:54 fuzzer started 2019/03/29 20:52:57 dialing manager at 10.128.0.26:38959 2019/03/29 20:52:57 syscalls: 1 2019/03/29 20:52:57 code coverage: enabled 2019/03/29 20:52:57 comparison tracing: enabled 2019/03/29 20:52:57 extra coverage: extra coverage is not supported by the kernel 2019/03/29 20:52:57 setuid sandbox: enabled 2019/03/29 20:52:57 namespace sandbox: enabled 2019/03/29 20:52:57 Android sandbox: /sys/fs/selinux/policy does not exist 2019/03/29 20:52:57 fault injection: enabled 2019/03/29 20:52:57 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/03/29 20:52:57 net packet injection: enabled 2019/03/29 20:52:57 net device setup: enabled 20:57:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x81000008912, &(0x7f0000000100)="0adc1f123c40a41d88b070") ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x2000000000007, 0x0, 0x1, 0x0, 0x7fe, 0x7d}) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5e57c3c34343d95ae791c4a17f7c49015b303067660f50e900004681e400000100440fe531c4c361796af3006c450754ddeaddc04c0f6eed") syzkaller login: [ 341.323366][ T7409] IPVS: ftp: loaded support on port[0] = 21 20:57:54 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x60015, 0x0, 0x4, 0x0, 0x2e0e, 0x0, 0x7}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5e57c3c36f995a91914e424a2664f0ff061e460f343030082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754ddea420fae9972b571112d02") [ 341.418661][ T7409] chnl_net:caif_netlink_parms(): no params data found [ 341.489181][ T7409] bridge0: port 1(bridge_slave_0) entered blocking state [ 341.498763][ T7409] bridge0: port 1(bridge_slave_0) entered disabled state [ 341.507695][ T7409] device bridge_slave_0 entered promiscuous mode [ 341.516689][ T7409] bridge0: port 2(bridge_slave_1) entered blocking state [ 341.533140][ T7409] bridge0: port 2(bridge_slave_1) entered disabled state [ 341.546007][ T7409] device bridge_slave_1 entered promiscuous mode [ 341.559023][ T7413] IPVS: ftp: loaded support on port[0] = 21 [ 341.580465][ T7409] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 341.603888][ T7409] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 341.635768][ T7409] team0: Port device team_slave_0 added 20:57:54 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x7ffe, 0x0, 0xe, 0x0, 0x9f}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") [ 341.656181][ T7409] team0: Port device team_slave_1 added [ 341.725369][ T7409] device hsr_slave_0 entered promiscuous mode 20:57:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)='tmpfs\x00') [ 341.842919][ T7409] device hsr_slave_1 entered promiscuous mode 20:57:55 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x80000008000009, 0x0, 0x0, 0x0, 0x3f, 0x10000000005, 0x3}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") [ 341.980453][ T7409] bridge0: port 2(bridge_slave_1) entered blocking state [ 341.988361][ T7409] bridge0: port 2(bridge_slave_1) entered forwarding state [ 341.997336][ T7409] bridge0: port 1(bridge_slave_0) entered blocking state [ 342.005454][ T7409] bridge0: port 1(bridge_slave_0) entered forwarding state [ 342.027002][ T7416] IPVS: ftp: loaded support on port[0] = 21 [ 342.040458][ T7418] IPVS: ftp: loaded support on port[0] = 21 [ 342.054051][ T7420] IPVS: ftp: loaded support on port[0] = 21 [ 342.157138][ T7413] chnl_net:caif_netlink_parms(): no params data found [ 342.191958][ T7409] 8021q: adding VLAN 0 to HW filter on device bond0 20:57:55 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff}, 0x14}}, 0x0) [ 342.263683][ T7409] 8021q: adding VLAN 0 to HW filter on device team0 [ 342.304495][ T7319] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 342.313458][ T7319] bridge0: port 1(bridge_slave_0) entered disabled state [ 342.332453][ T7319] bridge0: port 2(bridge_slave_1) entered disabled state [ 342.342518][ T7319] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 342.427402][ T7413] bridge0: port 1(bridge_slave_0) entered blocking state [ 342.438463][ T7413] bridge0: port 1(bridge_slave_0) entered disabled state [ 342.449626][ T7413] device bridge_slave_0 entered promiscuous mode [ 342.461049][ T7423] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 342.473573][ T7423] bridge0: port 1(bridge_slave_0) entered blocking state [ 342.483312][ T7423] bridge0: port 1(bridge_slave_0) entered forwarding state [ 342.511646][ T7425] IPVS: ftp: loaded support on port[0] = 21 [ 342.512299][ T7420] chnl_net:caif_netlink_parms(): no params data found [ 342.531472][ T7413] bridge0: port 2(bridge_slave_1) entered blocking state [ 342.540618][ T7413] bridge0: port 2(bridge_slave_1) entered disabled state [ 342.549732][ T7413] device bridge_slave_1 entered promiscuous mode [ 342.557333][ T7412] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 342.567153][ T7412] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 342.578072][ T7412] bridge0: port 2(bridge_slave_1) entered blocking state [ 342.587159][ T7412] bridge0: port 2(bridge_slave_1) entered forwarding state [ 342.597937][ T7416] chnl_net:caif_netlink_parms(): no params data found [ 342.628424][ T7412] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 342.640272][ T7418] chnl_net:caif_netlink_parms(): no params data found [ 342.689253][ T7413] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 342.701335][ T7430] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 342.711005][ T7430] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 342.722281][ T7430] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 342.759870][ T7413] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 342.777678][ T7430] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 342.788847][ T7430] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 342.800316][ T7430] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 342.811018][ T7430] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 342.823242][ T7430] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 342.849606][ T7416] bridge0: port 1(bridge_slave_0) entered blocking state [ 342.857871][ T7416] bridge0: port 1(bridge_slave_0) entered disabled state [ 342.867561][ T7416] device bridge_slave_0 entered promiscuous mode [ 342.884991][ T7409] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 342.898731][ T7409] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 342.929096][ T7416] bridge0: port 2(bridge_slave_1) entered blocking state [ 342.940043][ T7416] bridge0: port 2(bridge_slave_1) entered disabled state [ 342.951660][ T7416] device bridge_slave_1 entered promiscuous mode [ 342.962897][ T7319] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 342.973910][ T7319] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 342.994139][ T7418] bridge0: port 1(bridge_slave_0) entered blocking state [ 343.003142][ T7418] bridge0: port 1(bridge_slave_0) entered disabled state [ 343.012457][ T7418] device bridge_slave_0 entered promiscuous mode [ 343.024056][ T7420] bridge0: port 1(bridge_slave_0) entered blocking state [ 343.034492][ T7420] bridge0: port 1(bridge_slave_0) entered disabled state [ 343.045764][ T7420] device bridge_slave_0 entered promiscuous mode [ 343.054963][ T7420] bridge0: port 2(bridge_slave_1) entered blocking state [ 343.064141][ T7420] bridge0: port 2(bridge_slave_1) entered disabled state [ 343.075236][ T7420] device bridge_slave_1 entered promiscuous mode [ 343.085069][ T7413] team0: Port device team_slave_0 added [ 343.094761][ T7413] team0: Port device team_slave_1 added [ 343.116681][ T7418] bridge0: port 2(bridge_slave_1) entered blocking state [ 343.128916][ T7418] bridge0: port 2(bridge_slave_1) entered disabled state [ 343.140136][ T7418] device bridge_slave_1 entered promiscuous mode [ 343.164507][ T7416] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 343.216510][ T7418] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 343.228575][ T7416] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 343.285276][ T7413] device hsr_slave_0 entered promiscuous mode [ 343.344540][ T7413] device hsr_slave_1 entered promiscuous mode [ 343.406603][ T7420] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 343.417934][ T7409] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 343.431429][ T7418] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 343.455604][ T7425] chnl_net:caif_netlink_parms(): no params data found [ 343.483091][ T7420] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 343.509540][ T7420] team0: Port device team_slave_0 added [ 343.519668][ T7418] team0: Port device team_slave_0 added [ 343.537902][ T7418] team0: Port device team_slave_1 added [ 343.566267][ T7420] team0: Port device team_slave_1 added [ 343.579528][ T7416] team0: Port device team_slave_0 added [ 343.588093][ T7416] team0: Port device team_slave_1 added [ 343.685329][ T7418] device hsr_slave_0 entered promiscuous mode [ 343.743150][ T7418] device hsr_slave_1 entered promiscuous mode 20:57:57 executing program 0: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, 0x0) 20:57:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x81000008912, &(0x7f0000000100)="0adc1f123c40a41d88b070") ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x4, 0x0, 0x1b, 0x0, 0x0, 0xfffffffffffffffd, 0x1000}) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5e57c3c34343d95ae791c4a17f7c49015b303067660f50e900004681e400000100440fe531c4c361796af3006c450754ddeaddc04c0f6eed") [ 343.796818][ T7425] bridge0: port 1(bridge_slave_0) entered blocking state [ 343.805199][ T7425] bridge0: port 1(bridge_slave_0) entered disabled state [ 343.815390][ T7425] device bridge_slave_0 entered promiscuous mode [ 343.877269][ T7416] device hsr_slave_0 entered promiscuous mode [ 343.913176][ T7416] device hsr_slave_1 entered promiscuous mode [ 344.024371][ T7420] device hsr_slave_0 entered promiscuous mode [ 344.063010][ T7420] device hsr_slave_1 entered promiscuous mode 20:57:57 executing program 0: munmap(&(0x7f0000f52000/0x1000)=nil, 0x1000) mprotect(&(0x7f0000dfb000/0x1000)=nil, 0x1000, 0x6) mlock(&(0x7f0000a00000/0x600000)=nil, 0x600000) madvise(&(0x7f0000aa2000/0x1000)=nil, 0x20aa2000, 0x3) [ 344.108847][ T7425] bridge0: port 2(bridge_slave_1) entered blocking state [ 344.116361][ T7425] bridge0: port 2(bridge_slave_1) entered disabled state [ 344.125426][ T7425] device bridge_slave_1 entered promiscuous mode [ 344.148882][ T7425] bond0: Enslaving bond_slave_0 as an active interface with an up link 20:57:57 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x1) execveat(r1, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x1000) [ 344.196499][ T7425] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 344.219874][ T7425] team0: Port device team_slave_0 added [ 344.237325][ T7413] 8021q: adding VLAN 0 to HW filter on device bond0 [ 344.264645][ T7425] team0: Port device team_slave_1 added [ 344.277851][ T7413] 8021q: adding VLAN 0 to HW filter on device team0 [ 344.304512][ T7423] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready 20:57:57 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x1) execveat(r1, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x1000) [ 344.312095][ T7423] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 344.375273][ T7425] device hsr_slave_0 entered promiscuous mode [ 344.402901][ T7425] device hsr_slave_1 entered promiscuous mode 20:57:57 executing program 0: r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0x0, 0x0) msgsnd(r0, &(0x7f0000000180)={0x1, "4954f1c99eb8a7a83d78a6132ea9cd327a228fcdf26881b2bab781db437822f42f457eea93eede1d439f8ff59ce3461f4de3fa6fb1208e32d727882a5013b12e9068b9672c4d8a891a8a377c1460198dc4"}, 0x59, 0x800) [ 344.453674][ T7418] 8021q: adding VLAN 0 to HW filter on device bond0 [ 344.470265][ T7420] 8021q: adding VLAN 0 to HW filter on device bond0 [ 344.488461][ T7430] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 344.499924][ T7430] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 344.509894][ T7430] bridge0: port 1(bridge_slave_0) entered blocking state [ 344.516975][ T7430] bridge0: port 1(bridge_slave_0) entered forwarding state [ 344.525054][ T7430] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 344.533580][ T7430] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 344.541888][ T7430] bridge0: port 2(bridge_slave_1) entered blocking state 20:57:57 executing program 0: r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0x0, 0x0) msgsnd(r0, &(0x7f0000000180)={0x1, "4954f1c99eb8a7a83d78a6132ea9cd327a228fcdf26881b2bab781db437822f42f457eea93eede1d439f8ff59ce3461f4de3fa6fb1208e32d727882a5013b12e9068b9672c4d8a891a8a377c1460198dc4"}, 0x59, 0x800) [ 344.548981][ T7430] bridge0: port 2(bridge_slave_1) entered forwarding state [ 344.557015][ T7430] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 344.566047][ T7430] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 344.580925][ T7418] 8021q: adding VLAN 0 to HW filter on device team0 [ 344.606792][ T7420] 8021q: adding VLAN 0 to HW filter on device team0 [ 344.619187][ T7412] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 344.627498][ T7412] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 344.637236][ T7412] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 344.645494][ T7412] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 344.653586][ T7412] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 344.661140][ T7412] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 344.669858][ T7412] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 344.678286][ T7412] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 344.686289][ T7412] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 344.697832][ T7413] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 344.708586][ T7413] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 344.723875][ T7416] 8021q: adding VLAN 0 to HW filter on device bond0 [ 344.745247][ T7430] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 344.753325][ T7430] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 344.762322][ T7430] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 344.773186][ T7430] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 344.781332][ T7430] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 344.789754][ T7430] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 344.797463][ T7430] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 344.805224][ T7430] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 344.814184][ T7430] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 344.822434][ T7430] bridge0: port 1(bridge_slave_0) entered blocking state [ 344.829541][ T7430] bridge0: port 1(bridge_slave_0) entered forwarding state [ 344.837602][ T7430] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 344.845444][ T7430] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 344.854661][ T7416] 8021q: adding VLAN 0 to HW filter on device team0 [ 344.878216][ T7423] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 344.886710][ T7423] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 344.897265][ T7423] bridge0: port 2(bridge_slave_1) entered blocking state [ 344.904458][ T7423] bridge0: port 2(bridge_slave_1) entered forwarding state [ 344.912188][ T7423] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 344.921483][ T7423] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 344.930135][ T7423] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 344.938524][ T7423] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 344.946787][ T7423] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 344.955285][ T7423] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 344.963585][ T7423] bridge0: port 1(bridge_slave_0) entered blocking state [ 344.970623][ T7423] bridge0: port 1(bridge_slave_0) entered forwarding state [ 344.978190][ T7423] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 344.987964][ T7423] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 344.996253][ T7423] bridge0: port 2(bridge_slave_1) entered blocking state [ 345.003300][ T7423] bridge0: port 2(bridge_slave_1) entered forwarding state [ 345.011131][ T7423] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 345.019073][ T7423] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 345.036471][ T7319] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 345.046128][ T7319] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 345.054757][ T7319] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 345.064302][ T7319] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 345.072366][ T7319] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 345.080925][ T7319] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 345.089333][ T7319] bridge0: port 1(bridge_slave_0) entered blocking state [ 345.096416][ T7319] bridge0: port 1(bridge_slave_0) entered forwarding state [ 345.104062][ T7319] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 345.113481][ T7319] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 345.123613][ T7420] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 345.135952][ T7420] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 345.149849][ T7425] 8021q: adding VLAN 0 to HW filter on device bond0 [ 345.159650][ T7430] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 345.169055][ T7430] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 345.183293][ T7413] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 345.197386][ T7430] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 345.206129][ T7430] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 345.214868][ T7430] bridge0: port 2(bridge_slave_1) entered blocking state [ 345.221943][ T7430] bridge0: port 2(bridge_slave_1) entered forwarding state [ 345.229662][ T7430] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 345.238607][ T7430] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 345.247985][ T7430] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 345.256625][ T7430] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 345.266128][ T7430] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 345.274133][ T7430] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 345.292098][ T7418] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 345.303258][ T7418] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 345.327120][ T7425] 8021q: adding VLAN 0 to HW filter on device team0 [ 345.340470][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 345.352821][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 345.361082][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 345.369529][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 345.377881][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 345.386191][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 345.394449][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 345.403357][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 345.411626][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 345.420142][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 345.428411][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 345.436252][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 345.449479][ T7416] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network 20:57:58 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x1, 0x0, 0xc, 0x0, 0x7, 0x40e1b, 0x4000026}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") [ 345.460876][ T7416] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 345.474800][ T7420] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 345.483701][ T7430] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 345.491319][ T7430] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 345.499360][ T7430] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 345.509025][ T7430] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 345.517604][ T7430] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 345.527889][ T7430] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 345.540771][ T7418] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 345.556407][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 345.564405][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 345.573035][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 345.581559][ T3698] bridge0: port 1(bridge_slave_0) entered blocking state [ 345.588658][ T3698] bridge0: port 1(bridge_slave_0) entered forwarding state [ 345.596948][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 345.607622][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 345.617057][ T3698] bridge0: port 2(bridge_slave_1) entered blocking state [ 345.624142][ T3698] bridge0: port 2(bridge_slave_1) entered forwarding state [ 345.636047][ T7430] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 345.676292][ T7319] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 345.689000][ T7319] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 345.721088][ T7319] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 345.735136][ T7319] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 345.745751][ T7319] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 345.756215][ T7319] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 345.776302][ T7416] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 345.802223][ T7425] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 345.819064][ T7425] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 345.831883][ T7423] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 345.856905][ T7423] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 345.865589][ T7423] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 345.876921][ T7423] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 345.887962][ T7423] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 345.911464][ T7425] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 345.942488][ T7319] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 20:57:59 executing program 2: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\xe8\xee\xc9\x96\xc2;\xaf\t\xa8M*\xe4;~y\xb2\xb3\xba\b;/\xb6&\xa5\xaa\xcec\x1e\x8a;\xea;P\xb5w_2\f\xe5\xcc`\xa0\xce\xf0+\x19v\xb9I\xdf\xfe\x13\xd9\x1a\xd6;+\x16\x05\x1aul>\x82@\x0f\xdf\xcd\x99\x9a\x13\xe2[F\xf08\xa6D\x97\xb5\x1f\xf3\xe9\xd5\xbf\x13k\xbc)\xa1nbx\x9c\x02\xa6p?\x12\x89\nAr\xe9Q\xb0\x80Q\x8e\xf2\xf0yX\x9b\x96\xa4\x8b\x01f\xe0\x04\xbd\x93K!\xa0D-\xfc\x12\x02\xe2\xb5WQ\xb4\xb1\xf2\x16)\xc8\b\xc2\x99\x9a\xd9\xa6p\xedK\xb5\x8b\xe8\xbf\xa0\xa1\x13\xd78Mt$\x06\xb6c\xd0Y\x05\xd1l\x98|\xff\xb5\v\x930xffffffffffffffff}) close(r0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000000100)=0x1, 0x4) sendmmsg$unix(r0, &(0x7f0000005c40)=[{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000540)="8c", 0x1}], 0x1}], 0x1, 0x4000000) 20:57:59 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet(0x2, 0x3, 0x1c) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc5f123c123f319bd070") connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) getsockopt$inet6_int(r0, 0x29, 0x18, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) 20:57:59 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\xe8\xee\xc9\x96\xc2;\xaf\t\xa8M*\xe4;~y\xb2\xb3\xba\b;/\xb6&\xa5\xaa\xcec\x1e\x8a;\xea;P\xb5w_2\f\xe5\xcc`\xa0\xce\xf0+\x19v\xb9I\xdf\xfe\x13\xd9\x1a\xd6;+\x16\x05\x1aul>\x82@\x0f\xdf\xcd\x99\x9a\x13\xe2[F\xf08\xa6D\x97\xb5\x1f\xf3\xe9\xd5\xbf\x13k\xbc)\xa1nbx\x9c\x02\xa6p?\x12\x89\nAr\xe9Q\xb0\x80Q\x8e\xf2\xf0yX\x9b\x96\xa4\x8b\x01f\xe0\x04\xbd\x93K!\xa0D-\xfc\x12\x02\xe2\xb5WQ\xb4\xb1\xf2\x16)\xc8\b\xc2\x99\x9a\xd9\xa6p\xedK\xb5\x8b\xe8\xbf\xa0\xa1\x13\xd78Mt$\x06\xb6c\xd0Y\x05\xd1l\x98|\xff\xb5\v\x930x0) io_destroy(r2) 20:57:59 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x1, 0x0, 0xc, 0x0, 0x7, 0x40e1b, 0x4000026}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 20:57:59 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) [ 346.609504][ T7515] mmap: syz-executor.4 (7515) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. 20:57:59 executing program 0: socketpair$unix(0x1, 0x10001000000001, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c9b7d991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 20:57:59 executing program 3: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x103c, 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f00000002c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) process_vm_writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/107, 0x6b}], 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)=""/37, 0x25}], 0x1, 0x0) r1 = gettid() tkill(r1, 0x1000000000016) 20:58:00 executing program 4: r0 = open(&(0x7f0000000080)='./file0\x00', 0x80000000000206, 0x0) truncate(&(0x7f0000000180)='./file0\x00', 0x208020001) lseek(r0, 0x0, 0x3) poll(&(0x7f00000000c0)=[{r0}], 0x1, 0x0) socket$inet6_udp(0x1c, 0x2, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) exit(0x0) truncate(0x0, 0x0) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 20:58:00 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x1000, 0x0, 0x19, 0x0, 0x0, 0xffffffffffffffff, 0x5e}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5e57c3c7b7d95a91914e424a2664f0ff065b460f343030082e67660f50e9000046a1e400000100440fe531feabc4a39d6c450754ddea420fae9972b571112d02") 20:58:00 executing program 3: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000498000)={0x0, 0x0, &(0x7f00008b7ff0)={&(0x7f00003c0fdc)=ANY=[@ANYBLOB="24000000100002000c000100050002000000000000000000000000000000000000000000"], 0x24}}, 0x0) [ 346.910679][ T7545] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. 20:58:00 executing program 5: open_by_handle_at(0xffffffffffffffff, &(0x7f0000000380)={0xc92, 0x0, "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"}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001000)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xc}}], 0x1, 0x0) sigaltstack(&(0x7f0000001000/0x3000)=nil, 0x0) sigaltstack(&(0x7f0000001000/0x2000)=nil, 0x0) [ 346.980019][ T7547] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. 20:58:00 executing program 5: r0 = socket(0x10, 0x2, 0xc) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_GET_NO_NEW_PRIVS(0x27) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, 0x0) write(r0, &(0x7f0000594000)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, 0x0) write(r0, &(0x7f0000000000)="1f0000000104fffffd3b54c007110000f30501000b000500000010d10200cf", 0x1f) 20:58:00 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\xe8\xee\xc9\x96\xc2;\xaf\t\xa8M*\xe4;~y\xb2\xb3\xba\b;/\xb6&\xa5\xaa\xcec\x1e\x8a;\xea;P\xb5w_2\f\xe5\xcc`\xa0\xce\xf0+\x19v\xb9I\xdf\xfe\x13\xd9\x1a\xd6;+\x16\x05\x1aul>\x82@\x0f\xdf\xcd\x99\x9a\x13\xe2[F\xf08\xa6D\x97\xb5\x1f\xf3\xe9\xd5\xbf\x13k\xbc)\xa1nbx\x9c\x02\xa6p?\x12\x89\nAr\xe9Q\xb0\x80Q\x8e\xf2\xf0yX\x9b\x96\xa4\x8b\x01f\xe0\x04\xbd\x93K!\xa0D-\xfc\x12\x02\xe2\xb5WQ\xb4\xb1\xf2\x16)\xc8\b\xc2\x99\x9a\xd9\xa6p\xedK\xb5\x8b\xe8\xbf\xa0\xa1\x13\xd78Mt$\x06\xb6c\xd0Y\x05\xd1l\x98|\xff\xb5\v\x930xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x1, 0x0, 0xc, 0x0, 0x7, 0x40e1b, 0x4000026}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 20:58:00 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(r1, r3, 0x0, 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) 20:58:00 executing program 0: socketpair$unix(0x1, 0x10001000000001, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c9b7d991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 20:58:00 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(r1, r3, 0x0, 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) 20:58:00 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(r1, r3, 0x0, 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) 20:58:01 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x1000, 0x0, 0x19, 0x0, 0x0, 0xffffffffffffffff, 0x5e}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5e57c3c7b7d95a91914e424a2664f0ff065b460f343030082e67660f50e9000046a1e400000100440fe531feabc4a39d6c450754ddea420fae9972b571112d02") 20:58:01 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\xe8\xee\xc9\x96\xc2;\xaf\t\xa8M*\xe4;~y\xb2\xb3\xba\b;/\xb6&\xa5\xaa\xcec\x1e\x8a;\xea;P\xb5w_2\f\xe5\xcc`\xa0\xce\xf0+\x19v\xb9I\xdf\xfe\x13\xd9\x1a\xd6;+\x16\x05\x1aul>\x82@\x0f\xdf\xcd\x99\x9a\x13\xe2[F\xf08\xa6D\x97\xb5\x1f\xf3\xe9\xd5\xbf\x13k\xbc)\xa1nbx\x9c\x02\xa6p?\x12\x89\nAr\xe9Q\xb0\x80Q\x8e\xf2\xf0yX\x9b\x96\xa4\x8b\x01f\xe0\x04\xbd\x93K!\xa0D-\xfc\x12\x02\xe2\xb5WQ\xb4\xb1\xf2\x16)\xc8\b\xc2\x99\x9a\xd9\xa6p\xedK\xb5\x8b\xe8\xbf\xa0\xa1\x13\xd78Mt$\x06\xb6c\xd0Y\x05\xd1l\x98|\xff\xb5\v\x93Uo\xb2\xe3\xf3\x9a<\xde\x1f\xcaSd\x037\xec\x95aF\xbd\xbf\xcb\x11Pp\x19V1\xde]!\xa5\xea\x9ec\x8c+\xdbx\xa5\x01\xcaKn\xa3\x13\xd8%h\xf98,,?o\xab\xa6\xb4\xeeTy;N\xd2m\xae>R\"P)\xbb*\xc0\x00\x7fwuL?#\xce\xda\x98\t\xb9\xa9hJ\x94\n\xbc\xaa\x8c\xfc\xc7\x13>\xc4\"\xe9\xc88\x881\x8dA\xe9\xa4\x93\xf0\x19_\xe2Y\x96Q\xb8\x95\x04\xf5\xdb\xa1F%\xce#f\xf3=\x95\xdb\xa9/\x86ry\xca\xbfJ\xce\xdd\xc8Z\x8a\xf7\xa0\xfah\xd7g\xceQ6\xb9\xd0\xd1\x96lI\x9c\xb6\xbf4\xc2\x7f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0, 0x123}, 0x48) 20:58:01 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\xe8\xee\xc9\x96\xc2;\xaf\t\xa8M*\xe4;~y\xb2\xb3\xba\b;/\xb6&\xa5\xaa\xcec\x1e\x8a;\xea;P\xb5w_2\f\xe5\xcc`\xa0\xce\xf0+\x19v\xb9I\xdf\xfe\x13\xd9\x1a\xd6;+\x16\x05\x1aul>\x82@\x0f\xdf\xcd\x99\x9a\x13\xe2[F\xf08\xa6D\x97\xb5\x1f\xf3\xe9\xd5\xbf\x13k\xbc)\xa1nbx\x9c\x02\xa6p?\x12\x89\nAr\xe9Q\xb0\x80Q\x8e\xf2\xf0yX\x9b\x96\xa4\x8b\x01f\xe0\x04\xbd\x93K!\xa0D-\xfc\x12\x02\xe2\xb5WQ\xb4\xb1\xf2\x16)\xc8\b\xc2\x99\x9a\xd9\xa6p\xedK\xb5\x8b\xe8\xbf\xa0\xa1\x13\xd78Mt$\x06\xb6c\xd0Y\x05\xd1l\x98|\xff\xb5\v\x930xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x1, 0x0, 0xc, 0x0, 0x7, 0x40e1b, 0x4000026}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 20:58:01 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(r1, r3, 0x0, 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) 20:58:01 executing program 0: socketpair$unix(0x1, 0x10001000000001, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c9b7d991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 20:58:01 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x8, 0x0, 0x11, 0x402, 0x3a, 0x0, 0x2000}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 20:58:01 executing program 5: 20:58:01 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x1000, 0x0, 0x19, 0x0, 0x0, 0xffffffffffffffff, 0x5e}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5e57c3c7b7d95a91914e424a2664f0ff065b460f343030082e67660f50e9000046a1e400000100440fe531feabc4a39d6c450754ddea420fae9972b571112d02") 20:58:01 executing program 4: syz_open_procfs(0x0, &(0x7f0000000340)='clear_refs\x00') r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(r0, r2, 0x0, 0x1) 20:58:01 executing program 5: 20:58:01 executing program 5: 20:58:01 executing program 5: 20:58:01 executing program 4: syz_open_procfs(0x0, &(0x7f0000000340)='clear_refs\x00') r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendfile(r0, 0xffffffffffffffff, 0x0, 0x1) 20:58:02 executing program 5: 20:58:02 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x1, 0x0, 0xc, 0x0, 0x7, 0x40e1b, 0x4000026}) dup(r0) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 20:58:02 executing program 5: munmap(&(0x7f0000c32000/0x2000)=nil, 0x2000) mlock(&(0x7f0000a00000/0x600000)=nil, 0x600000) 20:58:02 executing program 0: socketpair$unix(0x1, 0x10001000000001, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c9b7d991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 20:58:02 executing program 4: syz_open_procfs(0x0, &(0x7f0000000340)='clear_refs\x00') r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendfile(r0, 0xffffffffffffffff, 0x0, 0x1) 20:58:02 executing program 5: 20:58:02 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x1000, 0x0, 0x19, 0x0, 0x0, 0xffffffffffffffff, 0x5e}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5e57c3c7b7d95a91914e424a2664f0ff065b460f343030082e67660f50e9000046a1e400000100440fe531feabc4a39d6c450754ddea420fae9972b571112d02") 20:58:02 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x8, 0x0, 0x11, 0x402, 0x3a, 0x0, 0x2000}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 20:58:02 executing program 5: 20:58:02 executing program 4: syz_open_procfs(0x0, &(0x7f0000000340)='clear_refs\x00') r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendfile(r0, 0xffffffffffffffff, 0x0, 0x1) 20:58:02 executing program 5: 20:58:02 executing program 5: 20:58:02 executing program 5: 20:58:03 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x1, 0x0, 0xc, 0x0, 0x7, 0x40e1b, 0x4000026}) dup(r0) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 20:58:03 executing program 0: socketpair$unix(0x1, 0x10001000000001, 0x0, &(0x7f0000000240)) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c9b7d991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 20:58:03 executing program 5: 20:58:03 executing program 5: 20:58:03 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x1000, 0x0, 0x19, 0x0, 0x0, 0xffffffffffffffff, 0x5e}) dup(r0) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5e57c3c7b7d95a91914e424a2664f0ff065b460f343030082e67660f50e9000046a1e400000100440fe531feabc4a39d6c450754ddea420fae9972b571112d02") 20:58:03 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x8, 0x0, 0x11, 0x402, 0x3a, 0x0, 0x2000}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 20:58:03 executing program 5: 20:58:03 executing program 5: 20:58:03 executing program 5: 20:58:03 executing program 5: 20:58:03 executing program 4: syz_open_procfs(0x0, &(0x7f0000000340)='clear_refs\x00') r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$inet_udp(0x2, 0x2, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(r0, r2, 0x0, 0x1) 20:58:03 executing program 5: 20:58:04 executing program 5: 20:58:04 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x1, 0x0, 0xc, 0x0, 0x7, 0x40e1b, 0x4000026}) dup(r0) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 20:58:04 executing program 0: socketpair$unix(0x1, 0x10001000000001, 0x0, &(0x7f0000000240)) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c9b7d991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 20:58:04 executing program 5: 20:58:04 executing program 5: 20:58:04 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x1000, 0x0, 0x19, 0x0, 0x0, 0xffffffffffffffff, 0x5e}) dup(r0) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5e57c3c7b7d95a91914e424a2664f0ff065b460f343030082e67660f50e9000046a1e400000100440fe531feabc4a39d6c450754ddea420fae9972b571112d02") 20:58:04 executing program 5: 20:58:04 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x8, 0x0, 0x11, 0x402, 0x3a, 0x0, 0x2000}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 20:58:04 executing program 5: 20:58:04 executing program 5: 20:58:04 executing program 5: 20:58:04 executing program 4: syz_open_procfs(0x0, &(0x7f0000000340)='clear_refs\x00') r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$inet_udp(0x2, 0x2, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(r0, r2, 0x0, 0x1) 20:58:04 executing program 5: 20:58:05 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x1, 0x0, 0xc, 0x0, 0x7, 0x40e1b, 0x4000026}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 20:58:05 executing program 5: 20:58:05 executing program 4: syz_open_procfs(0x0, &(0x7f0000000340)='clear_refs\x00') r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$inet_udp(0x2, 0x2, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(r0, r2, 0x0, 0x1) 20:58:05 executing program 0: socketpair$unix(0x1, 0x10001000000001, 0x0, &(0x7f0000000240)) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c9b7d991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 20:58:05 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x1000, 0x0, 0x19, 0x0, 0x0, 0xffffffffffffffff, 0x5e}) dup(r0) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5e57c3c7b7d95a91914e424a2664f0ff065b460f343030082e67660f50e9000046a1e400000100440fe531feabc4a39d6c450754ddea420fae9972b571112d02") 20:58:05 executing program 5: 20:58:05 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x8, 0x0, 0x11, 0x402, 0x3a, 0x0, 0x2000}) dup(r0) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 20:58:05 executing program 5: 20:58:05 executing program 4: syz_open_procfs(0x0, &(0x7f0000000340)='clear_refs\x00') r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(r0, r2, 0x0, 0x1) 20:58:05 executing program 5: 20:58:05 executing program 5: socketpair$unix(0x1, 0x200000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5e57c3c3b7d95a91914e424a2664f0ff065b460f343030082e67660f50e900004681e400000100440fe531feabc4aba39d6c0754ddea420fae9972b571112d02") write$binfmt_script(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="2321bb1ce4ad233283aba5717365720acfe112dd"], 0x14) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000000)="619ccf93474d88238f972e5aefdf071120938d") 20:58:05 executing program 4: syz_open_procfs(0x0, &(0x7f0000000340)='clear_refs\x00') r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(r0, r2, 0x0, 0x1) 20:58:06 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x1, 0x0, 0xc, 0x0, 0x7, 0x40e1b, 0x4000026}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 20:58:06 executing program 4: syz_open_procfs(0x0, &(0x7f0000000340)='clear_refs\x00') r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(r0, r2, 0x0, 0x1) 20:58:06 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c9b7d991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 20:58:06 executing program 4: syz_open_procfs(0x0, &(0x7f0000000340)='clear_refs\x00') r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(r0, r2, 0x0, 0x1) 20:58:06 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x1000, 0x0, 0x19, 0x0, 0x0, 0xffffffffffffffff, 0x5e}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5e57c3c7b7d95a91914e424a2664f0ff065b460f343030082e67660f50e9000046a1e400000100440fe531feabc4a39d6c450754ddea420fae9972b571112d02") 20:58:06 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x8, 0x0, 0x11, 0x402, 0x3a, 0x0, 0x2000}) dup(r0) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 20:58:06 executing program 4: syz_open_procfs(0x0, &(0x7f0000000340)='clear_refs\x00') r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(r0, r2, 0x0, 0x1) 20:58:06 executing program 5: socketpair$unix(0x1, 0x200000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5e57c3c3b7d95a91914e424a2664f0ff065b460f343030082e67660f50e900004681e400000100440fe531feabc4aba39d6c0754ddea420fae9972b571112d02") write$binfmt_script(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="2321bb1ce4ad233283aba5717365720acfe112dd"], 0x14) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000000)="619ccf93474d88238f972e5aefdf071120938d") 20:58:06 executing program 4: syz_open_procfs(0x0, &(0x7f0000000340)='clear_refs\x00') r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(r0, r2, 0x0, 0x1) 20:58:07 executing program 4: syz_open_procfs(0x0, &(0x7f0000000340)='clear_refs\x00') r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') close(0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(r0, r1, 0x0, 0x1) 20:58:07 executing program 4: syz_open_procfs(0x0, &(0x7f0000000340)='clear_refs\x00') r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') close(0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(r0, r1, 0x0, 0x1) 20:58:07 executing program 4: syz_open_procfs(0x0, &(0x7f0000000340)='clear_refs\x00') r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') close(0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(r0, r1, 0x0, 0x1) 20:58:07 executing program 4: syz_open_procfs(0x0, &(0x7f0000000340)='clear_refs\x00') r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(0xffffffffffffffff, r1, 0x0, 0x1) 20:58:07 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x1, 0x0, 0xc, 0x0, 0x7, 0x40e1b, 0x4000026}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 20:58:07 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c9b7d991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 20:58:07 executing program 4: syz_open_procfs(0x0, &(0x7f0000000340)='clear_refs\x00') r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(0xffffffffffffffff, r1, 0x0, 0x1) 20:58:07 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x1000, 0x0, 0x19, 0x0, 0x0, 0xffffffffffffffff, 0x5e}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5e57c3c7b7d95a91914e424a2664f0ff065b460f343030082e67660f50e9000046a1e400000100440fe531feabc4a39d6c450754ddea420fae9972b571112d02") 20:58:07 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x8, 0x0, 0x11, 0x402, 0x3a, 0x0, 0x2000}) dup(r0) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 20:58:07 executing program 4: syz_open_procfs(0x0, &(0x7f0000000340)='clear_refs\x00') r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(0xffffffffffffffff, r1, 0x0, 0x1) 20:58:07 executing program 5: socketpair$unix(0x1, 0x200000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5e57c3c3b7d95a91914e424a2664f0ff065b460f343030082e67660f50e900004681e400000100440fe531feabc4aba39d6c0754ddea420fae9972b571112d02") write$binfmt_script(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="2321bb1ce4ad233283aba5717365720acfe112dd"], 0x14) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000000)="619ccf93474d88238f972e5aefdf071120938d") 20:58:07 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(r0, r2, 0x0, 0x1) 20:58:07 executing program 4: r0 = syz_open_procfs(0x0, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(r0, r2, 0x0, 0x1) 20:58:08 executing program 4: r0 = syz_open_procfs(0x0, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(r0, r2, 0x0, 0x1) 20:58:08 executing program 4: r0 = syz_open_procfs(0x0, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(r0, r2, 0x0, 0x1) 20:58:08 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c9b7d991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 20:58:08 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 20:58:08 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(r0, r2, 0x0, 0x1) 20:58:08 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x8, 0x0, 0x11, 0x402, 0x3a, 0x0, 0x2000}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 20:58:08 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x1000, 0x0, 0x19, 0x0, 0x0, 0xffffffffffffffff, 0x5e}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5e57c3c7b7d95a91914e424a2664f0ff065b460f343030082e67660f50e9000046a1e400000100440fe531feabc4a39d6c450754ddea420fae9972b571112d02") 20:58:08 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(r0, r2, 0x0, 0x1) 20:58:08 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(r0, r2, 0x0, 0x1) 20:58:08 executing program 5: socketpair$unix(0x1, 0x200000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5e57c3c3b7d95a91914e424a2664f0ff065b460f343030082e67660f50e900004681e400000100440fe531feabc4aba39d6c0754ddea420fae9972b571112d02") write$binfmt_script(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="2321bb1ce4ad233283aba5717365720acfe112dd"], 0x14) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000000)="619ccf93474d88238f972e5aefdf071120938d") 20:58:08 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(r0, r2, 0x0, 0x1) 20:58:08 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(r0, r2, 0x0, 0x1) 20:58:08 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(r0, r2, 0x0, 0x1) 20:58:09 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(r0, r2, 0x0, 0x1) 20:58:09 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c9b7d991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 20:58:09 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 20:58:09 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(r0, r2, 0x0, 0x1) 20:58:09 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x8, 0x0, 0x11, 0x402, 0x3a, 0x0, 0x2000}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 20:58:09 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5e57c3c7b7d95a91914e424a2664f0ff065b460f343030082e67660f50e9000046a1e400000100440fe531feabc4a39d6c450754ddea420fae9972b571112d02") 20:58:09 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(r0, r2, 0x0, 0x1) 20:58:09 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(r0, r2, 0x0, 0x1) 20:58:09 executing program 5: socketpair$unix(0x1, 0x200000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5e57c3c3b7d95a91914e424a2664f0ff065b460f343030082e67660f50e900004681e400000100440fe531feabc4aba39d6c0754ddea420fae9972b571112d02") write$binfmt_script(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="2321bb1ce4ad233283aba5717365720acfe112dd"], 0x14) 20:58:09 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(r0, r2, 0x0, 0x1) 20:58:09 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(r0, r2, 0x0, 0x1) 20:58:09 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(r0, r2, 0x0, 0x1) 20:58:10 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c9b7d991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 20:58:10 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(r0, r2, 0x0, 0x1) 20:58:10 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 20:58:10 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x8, 0x0, 0x11, 0x402, 0x3a, 0x0, 0x2000}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 20:58:10 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5e57c3c7b7d95a91914e424a2664f0ff065b460f343030082e67660f50e9000046a1e400000100440fe531feabc4a39d6c450754ddea420fae9972b571112d02") 20:58:10 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(r0, r2, 0x0, 0x1) 20:58:10 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(r0, r2, 0x0, 0x1) 20:58:10 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(r0, r2, 0x0, 0x1) 20:58:10 executing program 5: socketpair$unix(0x1, 0x200000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5e57c3c3b7d95a91914e424a2664f0ff065b460f343030082e67660f50e900004681e400000100440fe531feabc4aba39d6c0754ddea420fae9972b571112d02") write$binfmt_script(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="2321bb1ce4ad233283aba5717365720acfe112dd"], 0x14) 20:58:10 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(r0, r2, 0x0, 0x1) 20:58:10 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, 0x0) sendfile(r0, r2, 0x0, 0x1) 20:58:10 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c9b7d991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 20:58:11 executing program 1: ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x1, 0x0, 0xc, 0x0, 0x7, 0x40e1b, 0x4000026}) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 20:58:11 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, 0x0) sendfile(r0, r2, 0x0, 0x1) 20:58:11 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5e57c3c7b7d95a91914e424a2664f0ff065b460f343030082e67660f50e9000046a1e400000100440fe531feabc4a39d6c450754ddea420fae9972b571112d02") 20:58:11 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 20:58:11 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, 0x0) sendfile(r0, r2, 0x0, 0x1) 20:58:11 executing program 4: syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(0xffffffffffffffff, r1, 0x0, 0x1) 20:58:11 executing program 4: syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(0xffffffffffffffff, r1, 0x0, 0x1) 20:58:11 executing program 5: socketpair$unix(0x1, 0x200000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5e57c3c3b7d95a91914e424a2664f0ff065b460f343030082e67660f50e900004681e400000100440fe531feabc4aba39d6c0754ddea420fae9972b571112d02") write$binfmt_script(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="2321bb1ce4ad233283aba5717365720acfe112dd"], 0x14) 20:58:11 executing program 4: syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(0xffffffffffffffff, r1, 0x0, 0x1) 20:58:11 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(r0, 0xffffffffffffffff, 0x0, 0x1) 20:58:11 executing program 0: socketpair$unix(0x1, 0x10001000000001, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c9b7d991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 20:58:11 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(r0, 0xffffffffffffffff, 0x0, 0x1) 20:58:11 executing program 1: ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x1, 0x0, 0xc, 0x0, 0x7, 0x40e1b, 0x4000026}) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 20:58:12 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(r0, 0xffffffffffffffff, 0x0, 0x1) 20:58:12 executing program 2: ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x1000, 0x0, 0x19, 0x0, 0x0, 0xffffffffffffffff, 0x5e}) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5e57c3c7b7d95a91914e424a2664f0ff065b460f343030082e67660f50e9000046a1e400000100440fe531feabc4a39d6c450754ddea420fae9972b571112d02") 20:58:12 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 20:58:12 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(r0, r2, 0x0, 0x0) 20:58:12 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(r0, r2, 0x0, 0x0) 20:58:12 executing program 5: socketpair$unix(0x1, 0x200000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5e57c3c3b7d95a91914e424a2664f0ff065b460f343030082e67660f50e900004681e400000100440fe531feabc4aba39d6c0754ddea420fae9972b571112d02") ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000000)="619ccf93474d88238f972e5aefdf071120938d") 20:58:12 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(r0, r2, 0x0, 0x0) 20:58:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x81000008912, &(0x7f0000000100)="0adc1f123c40a41d88b070") ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x29588f61, 0x0, 0xffa}) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5e57c3c34343d95ae791c4a17f7c49015b303067660f50e900004681e400000100440fe531c4c361796af3006c450754ddeaddc04c0f6eed") 20:58:12 executing program 0: socketpair$unix(0x1, 0x10001000000001, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c9b7d991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 20:58:12 executing program 1: ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x1, 0x0, 0xc, 0x0, 0x7, 0x40e1b, 0x4000026}) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 20:58:12 executing program 2: ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x1000, 0x0, 0x19, 0x0, 0x0, 0xffffffffffffffff, 0x5e}) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5e57c3c7b7d95a91914e424a2664f0ff065b460f343030082e67660f50e9000046a1e400000100440fe531feabc4a39d6c450754ddea420fae9972b571112d02") 20:58:12 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 20:58:13 executing program 5: socketpair$unix(0x1, 0x200000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5e57c3c3b7d95a91914e424a2664f0ff065b460f343030082e67660f50e900004681e400000100440fe531feabc4aba39d6c0754ddea420fae9972b571112d02") ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000000)="619ccf93474d88238f972e5aefdf071120938d") 20:58:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x81000008912, &(0x7f0000000100)="0adc1f123c40a41d88b070") ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x29588f61, 0x0, 0xffa}) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5e57c3c34343d95ae791c4a17f7c49015b303067660f50e900004681e400000100440fe531c4c361796af3006c450754ddeaddc04c0f6eed") 20:58:13 executing program 0: socketpair$unix(0x1, 0x10001000000001, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c9b7d991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 20:58:13 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x1, 0x0, 0xc, 0x0, 0x7, 0x40e1b, 0x4000026}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 20:58:13 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x8, 0x0, 0x11, 0x402, 0x3a, 0x0, 0x2000}) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 20:58:13 executing program 2: ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x1000, 0x0, 0x19, 0x0, 0x0, 0xffffffffffffffff, 0x5e}) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5e57c3c7b7d95a91914e424a2664f0ff065b460f343030082e67660f50e9000046a1e400000100440fe531feabc4a39d6c450754ddea420fae9972b571112d02") 20:58:14 executing program 5: socketpair$unix(0x1, 0x200000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5e57c3c3b7d95a91914e424a2664f0ff065b460f343030082e67660f50e900004681e400000100440fe531feabc4aba39d6c0754ddea420fae9972b571112d02") ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000000)="619ccf93474d88238f972e5aefdf071120938d") 20:58:14 executing program 0: socketpair$unix(0x1, 0x10001000000001, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c9b7d991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 20:58:14 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x81000008912, &(0x7f0000000100)="0adc1f123c40a41d88b070") ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x29588f61, 0x0, 0xffa}) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5e57c3c34343d95ae791c4a17f7c49015b303067660f50e900004681e400000100440fe531c4c361796af3006c450754ddeaddc04c0f6eed") 20:58:14 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x1, 0x0, 0xc, 0x0, 0x7, 0x40e1b, 0x4000026}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 20:58:14 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x1000, 0x0, 0x19, 0x0, 0x0, 0xffffffffffffffff, 0x5e}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5e57c3c7b7d95a91914e424a2664f0ff065b460f343030082e67660f50e9000046a1e400000100440fe531feabc4a39d6c450754ddea420fae9972b571112d02") 20:58:14 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x8, 0x0, 0x11, 0x402, 0x3a, 0x0, 0x2000}) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 20:58:15 executing program 5: socketpair$unix(0x1, 0x200000000000001, 0x0, &(0x7f0000000140)) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5e57c3c3b7d95a91914e424a2664f0ff065b460f343030082e67660f50e900004681e400000100440fe531feabc4aba39d6c0754ddea420fae9972b571112d02") write$binfmt_script(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="2321bb1ce4ad233283aba5717365720acfe112dd"], 0x14) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000000)="619ccf93474d88238f972e5aefdf071120938d") 20:58:15 executing program 0: socketpair$unix(0x1, 0x10001000000001, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c9b7d991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 20:58:15 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x81000008912, &(0x7f0000000100)="0adc1f123c40a41d88b070") ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x29588f61, 0x0, 0xffa}) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5e57c3c34343d95ae791c4a17f7c49015b303067660f50e900004681e400000100440fe531c4c361796af3006c450754ddeaddc04c0f6eed") 20:58:15 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x1, 0x0, 0xc, 0x0, 0x7, 0x40e1b, 0x4000026}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 20:58:15 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x1000, 0x0, 0x19, 0x0, 0x0, 0xffffffffffffffff, 0x5e}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5e57c3c7b7d95a91914e424a2664f0ff065b460f343030082e67660f50e9000046a1e400000100440fe531feabc4a39d6c450754ddea420fae9972b571112d02") 20:58:15 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x8, 0x0, 0x11, 0x402, 0x3a, 0x0, 0x2000}) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 20:58:16 executing program 5: socketpair$unix(0x1, 0x200000000000001, 0x0, &(0x7f0000000140)) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5e57c3c3b7d95a91914e424a2664f0ff065b460f343030082e67660f50e900004681e400000100440fe531feabc4aba39d6c0754ddea420fae9972b571112d02") write$binfmt_script(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="2321bb1ce4ad233283aba5717365720acfe112dd"], 0x14) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000000)="619ccf93474d88238f972e5aefdf071120938d") 20:58:16 executing program 0: socketpair$unix(0x1, 0x10001000000001, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c9b7d991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 20:58:16 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x81000008912, &(0x7f0000000100)="0adc1f123c40a41d88b070") syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5e57c3c34343d95ae791c4a17f7c49015b303067660f50e900004681e400000100440fe531c4c361796af3006c450754ddeaddc04c0f6eed") 20:58:16 executing program 1: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x1, 0x0, 0xc, 0x0, 0x7, 0x40e1b, 0x4000026}) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 20:58:16 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x1000, 0x0, 0x19, 0x0, 0x0, 0xffffffffffffffff, 0x5e}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5e57c3c7b7d95a91914e424a2664f0ff065b460f343030082e67660f50e9000046a1e400000100440fe531feabc4a39d6c450754ddea420fae9972b571112d02") 20:58:16 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x8, 0x0, 0x11, 0x402, 0x3a, 0x0, 0x2000}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 20:58:17 executing program 5: socketpair$unix(0x1, 0x200000000000001, 0x0, &(0x7f0000000140)) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5e57c3c3b7d95a91914e424a2664f0ff065b460f343030082e67660f50e900004681e400000100440fe531feabc4aba39d6c0754ddea420fae9972b571112d02") write$binfmt_script(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="2321bb1ce4ad233283aba5717365720acfe112dd"], 0x14) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000000)="619ccf93474d88238f972e5aefdf071120938d") 20:58:17 executing program 0: socketpair$unix(0x1, 0x10001000000001, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c9b7d991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 20:58:17 executing program 1: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x1, 0x0, 0xc, 0x0, 0x7, 0x40e1b, 0x4000026}) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 20:58:17 executing program 2: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x1000, 0x0, 0x19, 0x0, 0x0, 0xffffffffffffffff, 0x5e}) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5e57c3c7b7d95a91914e424a2664f0ff065b460f343030082e67660f50e9000046a1e400000100440fe531feabc4a39d6c450754ddea420fae9972b571112d02") 20:58:17 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x8, 0x0, 0x11, 0x402, 0x3a, 0x0, 0x2000}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 20:58:17 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x81000008912, &(0x7f0000000100)="0adc1f123c40a41d88b070") syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5e57c3c34343d95ae791c4a17f7c49015b303067660f50e900004681e400000100440fe531c4c361796af3006c450754ddeaddc04c0f6eed") 20:58:18 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x8, 0x0, 0x11, 0x402, 0x3a, 0x0, 0x2000}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 20:58:18 executing program 2: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x1000, 0x0, 0x19, 0x0, 0x0, 0xffffffffffffffff, 0x5e}) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5e57c3c7b7d95a91914e424a2664f0ff065b460f343030082e67660f50e9000046a1e400000100440fe531feabc4a39d6c450754ddea420fae9972b571112d02") 20:58:18 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5e57c3c3b7d95a91914e424a2664f0ff065b460f343030082e67660f50e900004681e400000100440fe531feabc4aba39d6c0754ddea420fae9972b571112d02") write$binfmt_script(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="2321bb1ce4ad233283aba5717365720acfe112dd"], 0x14) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000000)="619ccf93474d88238f972e5aefdf071120938d") 20:58:18 executing program 0: socketpair$unix(0x1, 0x10001000000001, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c9b7d991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 20:58:18 executing program 1: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x1, 0x0, 0xc, 0x0, 0x7, 0x40e1b, 0x4000026}) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 20:58:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x81000008912, &(0x7f0000000100)="0adc1f123c40a41d88b070") syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5e57c3c34343d95ae791c4a17f7c49015b303067660f50e900004681e400000100440fe531c4c361796af3006c450754ddeaddc04c0f6eed") 20:58:19 executing program 0: socketpair$unix(0x1, 0x10001000000001, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c9b7d991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 20:58:19 executing program 3: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x8, 0x0, 0x11, 0x402, 0x3a, 0x0, 0x2000}) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 20:58:19 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5e57c3c3b7d95a91914e424a2664f0ff065b460f343030082e67660f50e900004681e400000100440fe531feabc4aba39d6c0754ddea420fae9972b571112d02") write$binfmt_script(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="2321bb1ce4ad233283aba5717365720acfe112dd"], 0x14) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000000)="619ccf93474d88238f972e5aefdf071120938d") 20:58:19 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 20:58:19 executing program 2: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x1000, 0x0, 0x19, 0x0, 0x0, 0xffffffffffffffff, 0x5e}) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5e57c3c7b7d95a91914e424a2664f0ff065b460f343030082e67660f50e9000046a1e400000100440fe531feabc4a39d6c450754ddea420fae9972b571112d02") 20:58:19 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x29588f61, 0x0, 0xffa}) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5e57c3c34343d95ae791c4a17f7c49015b303067660f50e900004681e400000100440fe531c4c361796af3006c450754ddeaddc04c0f6eed") 20:58:20 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5e57c3c3b7d95a91914e424a2664f0ff065b460f343030082e67660f50e900004681e400000100440fe531feabc4aba39d6c0754ddea420fae9972b571112d02") write$binfmt_script(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="2321bb1ce4ad233283aba5717365720acfe112dd"], 0x14) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000000)="619ccf93474d88238f972e5aefdf071120938d") 20:58:20 executing program 0: socketpair$unix(0x1, 0x10001000000001, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_execute_func(0x0) 20:58:20 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 20:58:20 executing program 0: socketpair$unix(0x1, 0x10001000000001, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_execute_func(0x0) 20:58:20 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5e57c3c7b7d95a91914e424a2664f0ff065b460f343030082e67660f50e9000046a1e400000100440fe531feabc4a39d6c450754ddea420fae9972b571112d02") 20:58:20 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x29588f61, 0x0, 0xffa}) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5e57c3c34343d95ae791c4a17f7c49015b303067660f50e900004681e400000100440fe531c4c361796af3006c450754ddeaddc04c0f6eed") 20:58:20 executing program 3: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x8, 0x0, 0x11, 0x402, 0x3a, 0x0, 0x2000}) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 20:58:20 executing program 0: socketpair$unix(0x1, 0x10001000000001, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_execute_func(0x0) 20:58:20 executing program 0: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b380002000000000000000300000000000000000000000000000000000000000000000000000000008000f800000000000000"], 0x68) write$P9_RREAD(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3ccd7631c66f3d3f2560000000000000000000000000000"], 0x90) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) [ 367.232801][ T8225] kasan: CONFIG_KASAN_INLINE enabled [ 367.249225][ T8225] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 367.292480][ T8225] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 367.299463][ T8225] CPU: 1 PID: 8225 Comm: syz-executor.0 Not tainted 5.1.0-rc2-next-20190329 #14 [ 367.308484][ T8225] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 367.318673][ T8225] RIP: 0010:load_elf_binary+0x7cd/0x5230 [ 367.324332][ T8225] Code: f0 fe ff ff e8 b4 4b dc ff e8 bf e2 a3 ff 48 8b 85 18 ff ff ff 48 8d 78 20 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 a5 49 00 00 4c 8b bd 18 ff ff ff be 04 00 00 00 [ 367.343945][ T8225] RSP: 0018:ffff888045acfbe8 EFLAGS: 00010207 [ 367.350035][ T8225] RAX: dffffc0000000000 RBX: fffffffffffffffe RCX: ffffc90005dfb000 [ 367.358025][ T8225] RDX: 0000000000000003 RSI: ffffffff81cc7ec1 RDI: 000000000000001e [ 367.366027][ T8225] RBP: ffff888045acfd68 R08: ffff88808ab46240 R09: fffffbfff11a6d55 [ 367.374031][ T8225] R10: fffffbfff11a6d54 R11: ffffffff88d36aa3 R12: 00000000fffffffe [ 367.382037][ T8225] R13: ffff8880a09a5300 R14: ffff888099e87cc0 R15: ffff8880858ea640 [ 367.390030][ T8225] FS: 00007fd648de1700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 367.398977][ T8225] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 367.405571][ T8225] CR2: 00000000004cf470 CR3: 000000009b533000 CR4: 00000000001406e0 [ 367.413556][ T8225] Call Trace: [ 367.416947][ T8225] ? load_misc_binary+0xb1/0x1161 [ 367.422072][ T8225] ? mark_held_locks+0xf0/0xf0 [ 367.426859][ T8225] ? do_raw_read_unlock+0x3f/0x70 [ 367.432025][ T8225] ? _raw_read_unlock+0x2d/0x50 [ 367.436904][ T8225] ? notesize.isra.0+0x80/0x80 [ 367.441683][ T8225] ? lock_downgrade+0x880/0x880 [ 367.446612][ T8225] ? search_binary_handler+0x18e/0x570 [ 367.452161][ T8225] ? kasan_check_write+0x14/0x20 [ 367.457113][ T8225] search_binary_handler+0x17f/0x570 [ 367.462415][ T8225] __do_execve_file.isra.0+0x1394/0x23f0 [ 367.468769][ T8225] ? copy_strings_kernel+0x110/0x110 [ 367.474779][ T8225] ? strncpy_from_user+0x2a8/0x380 [ 367.480023][ T8225] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 367.486325][ T8225] __x64_sys_execveat+0xed/0x130 [ 367.491603][ T8225] do_syscall_64+0x103/0x610 [ 367.496323][ T8225] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 367.502277][ T8225] RIP: 0033:0x458209 [ 367.506205][ T8225] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 367.527053][ T8225] RSP: 002b:00007fd648de0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 367.535570][ T8225] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000458209 [ 367.543560][ T8225] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000003 [ 367.551545][ T8225] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 [ 367.559569][ T8225] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd648de16d4 [ 367.567561][ T8225] R13: 00000000004be76b R14: 00000000004cf470 R15: 00000000ffffffff [ 367.575575][ T8225] Modules linked in: 20:58:21 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") [ 367.853068][ T8225] ---[ end trace c584808a7e728c74 ]--- [ 367.858689][ T8225] RIP: 0010:load_elf_binary+0x7cd/0x5230 [ 367.876030][ T8225] Code: f0 fe ff ff e8 b4 4b dc ff e8 bf e2 a3 ff 48 8b 85 18 ff ff ff 48 8d 78 20 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 a5 49 00 00 4c 8b bd 18 ff ff ff be 04 00 00 00 20:58:21 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5e57c3c7b7d95a91914e424a2664f0ff065b460f343030082e67660f50e9000046a1e400000100440fe531feabc4a39d6c450754ddea420fae9972b571112d02") 20:58:21 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x29588f61, 0x0, 0xffa}) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5e57c3c34343d95ae791c4a17f7c49015b303067660f50e900004681e400000100440fe531c4c361796af3006c450754ddeaddc04c0f6eed") 20:58:21 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5e57c3c3b7d95a91914e424a2664f0ff065b460f343030082e67660f50e900004681e400000100440fe531feabc4aba39d6c0754ddea420fae9972b571112d02") write$binfmt_script(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="2321bb1ce4ad233283aba5717365720acfe112dd"], 0x14) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000000)="619ccf93474d88238f972e5aefdf071120938d") [ 367.917805][ T3877] kobject: 'loop1' (00000000683378c3): kobject_uevent_env [ 367.923565][ T8225] RSP: 0018:ffff888045acfbe8 EFLAGS: 00010207 [ 367.929769][ T3877] kobject: 'loop1' (00000000683378c3): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 367.938028][ T8225] RAX: dffffc0000000000 RBX: fffffffffffffffe RCX: ffffc90005dfb000 20:58:21 executing program 3: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x8, 0x0, 0x11, 0x402, 0x3a, 0x0, 0x2000}) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") [ 367.962682][ T8225] RDX: 0000000000000003 RSI: ffffffff81cc7ec1 RDI: 000000000000001e [ 367.978818][ T3877] kobject: 'loop5' (00000000e6889ba4): kobject_uevent_env [ 367.989349][ T8225] RBP: ffff888045acfd68 R08: ffff88808ab46240 R09: fffffbfff11a6d55 [ 367.998203][ T3877] kobject: 'loop5' (00000000e6889ba4): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 368.009170][ T8225] R10: fffffbfff11a6d54 R11: ffffffff88d36aa3 R12: 00000000fffffffe [ 368.030943][ T3877] kobject: 'loop4' (0000000049a4ed12): kobject_uevent_env [ 368.041771][ T8225] R13: ffff8880a09a5300 R14: ffff888099e87cc0 R15: ffff8880858ea640 [ 368.051596][ T3877] kobject: 'loop4' (0000000049a4ed12): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 368.074691][ T8225] FS: 00007fd648de1700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 368.080202][ T3877] kobject: 'loop2' (00000000ad9342c4): kobject_uevent_env [ 368.100853][ T3877] kobject: 'loop2' (00000000ad9342c4): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 368.101590][ T8225] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 368.134129][ T3877] kobject: 'loop3' (00000000e2e36ecd): kobject_uevent_env [ 368.148327][ T3877] kobject: 'loop3' (00000000e2e36ecd): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 368.162113][ T8225] CR2: 000000000073c000 CR3: 000000009b533000 CR4: 00000000001406f0 [ 368.332688][ T8225] Kernel panic - not syncing: Fatal exception [ 368.339606][ T8225] Kernel Offset: disabled [ 368.344041][ T8225] Rebooting in 86400 seconds..