syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) 04:13:29 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x60000007, 0x2e0854ef, 0x0, 0x0, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf8", [[]]}, 0x20a) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) restart_syscall() pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000100), &(0x7f0000000180)=0x4) ioctl$FS_IOC_SETVERSION(r2, 0x40087602, &(0x7f00000001c0)=0xfffffffffffffffd) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) socket(0x0, 0x400000000000003, 0x0) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:29 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="7f454c4600009c23060000000000000002003e0007000000b8000000380000002a02000005000000000020000200ff01020000f00000000004000000000000000400000000000080af34000080000000ff000000ffffffff07000060ef54082efcffffff0900000001000100090000000500000009000000a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeedbd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26849995399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e0000000000000000008a0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000"/568], 0x243) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(r0, 0x406, r1) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:29 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80d", [[]]}, 0x1f8) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) write$apparmor_exec(r1, &(0x7f00000002c0)=ANY=[], 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) 04:13:29 executing program 5: r0 = syz_open_dev$loop(0x0, 0x0, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x223) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r1, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x6f, 0x1, {0x1, [{0x14, 0x2, 0x4}]}}, 0x16) write(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:29 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="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"/522], 0x20a) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) socket(0x0, 0x400000000000003, 0x0) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x48000, 0x0) 04:13:29 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80d", [[]]}, 0x1f8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) write$apparmor_exec(r1, &(0x7f00000002c0)=ANY=[], 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) 04:13:29 executing program 4: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000000c0)) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x2c001, 0x0) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a000000", 0x22) write$apparmor_exec(r0, &(0x7f00000002c0)=ANY=[], 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') 04:13:29 executing program 0: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x0, 0x0, 0x9, 0x0, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab87"}, 0xfe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f00000000c0)={0x20, 0x0, 0x7, {0x0, 0x4}}, 0x20) mkdir(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000140)) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000100)=r1) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:29 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x0, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}, {0x60000007, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x243) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') ioctl$sock_inet_SIOCSIFNETMASK(r2, 0x891c, &(0x7f0000000500)={'bridge_slave_1\x00', {0x2, 0x4e21, @empty}}) fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000100)={@multicast1, @rand_addr, 0x0}, &(0x7f0000000140)=0xc) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in=@loopback, 0x4e23, 0x7, 0x4e24, 0x9, 0xa, 0x20, 0x20, 0x3c, r3, r1}, {0x20, 0x8, 0xf1f0, 0x9, 0x7fff, 0xfffffffffffffffb, 0x1, 0x8}, {0x4, 0x1, 0x40, 0x3f}, 0x35, 0x0, 0x2, 0x1, 0x1, 0x1}, {{@in=@broadcast, 0x4d6, 0x2b}, 0x2, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x34ff, 0x1, 0x3, 0x6, 0x8, 0x400, 0x6d1}}, 0xe8) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:29 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80d", [[]]}, 0x1f8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) write$apparmor_exec(r1, &(0x7f00000002c0)=ANY=[], 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) 04:13:29 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x60000007, 0x2e0854ef, 0x0, 0x0, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf8", [[]]}, 0x20a) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x200000, 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/status\x00', 0x0, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCSPGRP(r2, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) socket(0x0, 0x400000000000003, 0x0) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') getsockopt$IP_VS_SO_GET_DESTS(r1, 0x0, 0x484, &(0x7f00000004c0)=""/98, &(0x7f0000000200)=0x62) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:29 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80d", [[]]}, 0x1f8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) write$apparmor_exec(r1, &(0x7f00000002c0)=ANY=[], 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) 04:13:29 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c6600009c23060000000000000002003e0007000000b8000000380000002a02000005000000000020000200ff01020000f00000000004000000000000000400000000000080af34000080000000ff000000ffffffff07000060ef54082efcffffff090000000100010009000000050000000900004da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fcc86ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee40c1744d293d823e0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c90000000000000000000000000000000000000000000019000000000000b047f933c17df5058568c0231b0d98b990a72030de275e1e96902e0e99cb337c5e3c82c1261b91b83d7a126331b2bb3de726c8533a1b0000000000000000d07f9c693613cd8f00bbd40d1c7a08a4e0361973c8f675eed8a1d742630d7d32af868288ce7351de27a3e90e8fb0a49eae540f3636668ece0758bb0158fb025ae1187c01a86c4e9e554d3d5389f0a807d1d86c86e4a5d7fedb1f0dd41fb9330519d71ce28047460f96f25b421a40a50293b0bc761264d3dc87d9b260a9e6c583e112500d54ed59a8db36837a78ad4d01722454dfd792fb73d9ad2498870a3f4d37d16c0e65ec89bc15f15dc854674985d625955efdb63157476a1e91e5ddbcef52f9631636e54256afb364a7453e780f1b6423c91380cf0ad81dbd70744afaec5aa746ea6adab128af272eeca92ce7915934de2d00b6153e41062f1fa0f0c7c7c1cdc8ecaadee96a7b0dc8609c5ae49c9525f2f9d9bd6f11f0866560de6af0465f83ac235d770e2a1cb44acd3827900cdde96b773f2e1a91ec715e4d963878bb9cf7ff5f624070055ed2d6d9f98c3fbb8d80680d78b839ead7bcbfebc44a515ebc956c85bda469395dc8c52a507a7d"], 0x243) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) write(0xffffffffffffffff, &(0x7f0000001100)="64ff00bcea0200000000100f000ee1000c08000a0000000000", 0x19) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r1) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:29 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80d", [[]]}, 0x1f8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) write$apparmor_exec(r1, &(0x7f00000002c0)=ANY=[], 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) 04:13:29 executing program 4: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000000c0)) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x2c001, 0x0) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a00000000", 0x23) write$apparmor_exec(r0, &(0x7f00000002c0)=ANY=[], 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') 04:13:29 executing program 5: r0 = syz_open_dev$loop(0x0, 0x0, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x223) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r1, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x6f, 0x1, {0x1, [{0x14, 0x2, 0x4}]}}, 0x16) write(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:29 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x0, 0x0, 0x9, 0x0, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab87"}, 0xfe) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) r2 = accept4$packet(r0, &(0x7f00000000c0), &(0x7f0000000100)=0x14, 0x800) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000140)) mkdir(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, r1) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:29 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80d", [[]]}, 0x1f8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) write$apparmor_exec(r1, &(0x7f00000002c0)=ANY=[], 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) 04:13:29 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x2000020000000000, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x0, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}, {0x60000007, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x243) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f00000008c0), 0x0) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, 0x0, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') r2 = fcntl$dupfd(0xffffffffffffffff, 0x406, r1) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000240), 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, r3, 0x22, 0x70bd29, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7fff}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x4000000) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='security.SMACK64EXEC\x00', &(0x7f0000000580)='fd/3\x00', 0x5, 0x3) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:29 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="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"/522], 0x20a) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000000c0)=0x0) ptrace$getsig(0x4202, r1, 0x3, &(0x7f0000000180)) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) r2 = socket$netlink(0x10, 0x3, 0xf) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000100), 0x10) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) socket(0x0, 0x400000000000003, 0x0) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r3, 0x0, 0x2a, &(0x7f00000004c0)={0xf8, {{0x2, 0x4e21, @loopback}}}, 0x88) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:30 executing program 4: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000000c0)) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x2c001, 0x0) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a00000000", 0x23) write$apparmor_exec(r0, &(0x7f00000002c0)=ANY=[], 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') 04:13:30 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(r0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x243) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/hash_stats\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x40000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) setresgid(r1, r1, r1) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') r3 = fcntl$dupfd(0xffffffffffffffff, 0x406, r2) sendmsg$nl_route_sched(r3, &(0x7f0000000400)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000003c0)={&(0x7f0000000180)=@deltaction={0x21c, 0x31, 0x10, 0x70bd29, 0x25dfdbff, {}, [@TCA_ACT_TAB={0x4c, 0x1, [{0x10, 0xf, @TCA_ACT_INDEX={0x8, 0x3, 0x74}}, {0x10, 0xe, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}, {0x18, 0x10, @TCA_ACT_KIND={0x10, 0x1, 'connmark\x00'}}, {0x10, 0x1f, @TCA_ACT_KIND={0x8, 0x1, 'nat\x00'}}]}, @TCA_ACT_TAB={0xc0, 0x1, [{0x14, 0x15, @TCA_ACT_KIND={0xc, 0x1, 'gact\x00'}}, {0x14, 0xf, @TCA_ACT_KIND={0xc, 0x1, 'mirred\x00'}}, {0x18, 0xd, @TCA_ACT_KIND={0x10, 0x1, 'tunnel_key\x00'}}, {0x10, 0x17, @TCA_ACT_INDEX={0x8, 0x3, 0x10001}}, {0x14, 0x7, @TCA_ACT_KIND={0xc, 0x1, 'skbmod\x00'}}, {0x14, 0xc, @TCA_ACT_KIND={0xc, 0x1, 'police\x00'}}, {0x10, 0x3, @TCA_ACT_INDEX={0x8, 0x3, 0x5}}, {0x10, 0xe, @TCA_ACT_INDEX={0x8, 0x3, 0x3b3}}, {0x10, 0x17, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}, {0x14, 0x7, @TCA_ACT_KIND={0xc, 0x1, 'police\x00'}}]}, @TCA_ACT_TAB={0xbc, 0x1, [{0x10, 0x1e, @TCA_ACT_INDEX={0x8, 0x3, 0x4}}, {0x10, 0x13, @TCA_ACT_KIND={0x8, 0x1, 'nat\x00'}}, {0x10, 0xe, @TCA_ACT_INDEX={0x8, 0x3, 0x2}}, {0x10, 0x5, @TCA_ACT_KIND={0x8, 0x1, 'nat\x00'}}, {0x18, 0x1a, @TCA_ACT_KIND={0x10, 0x1, 'tunnel_key\x00'}}, {0x10, 0x4, @TCA_ACT_INDEX={0x8, 0x3, 0xb4a5}}, {0x10, 0x11, @TCA_ACT_INDEX={0x8, 0x3, 0xffffffffffffff00}}, {0x18, 0x18, @TCA_ACT_KIND={0x10, 0x1, 'tunnel_key\x00'}}, {0x10, 0x19, @TCA_ACT_INDEX={0x8, 0x3, 0x3f}}, {0x18, 0x15, @TCA_ACT_KIND={0x10, 0x1, 'connmark\x00'}}]}, @TCA_ACT_TAB={0x40, 0x1, [{0x14, 0x1c, @TCA_ACT_KIND={0xc, 0x1, 'skbedit\x00'}}, {0x14, 0x1d, @TCA_ACT_KIND={0xc, 0x1, 'skbedit\x00'}}, {0x14, 0x1e, @TCA_ACT_KIND={0xc, 0x1, 'skbedit\x00'}}]}]}, 0x21c}}, 0x800) openat$full(0xffffffffffffff9c, 0x0, 0x100000000, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:30 executing program 0: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x0, 0x0, 0x9, 0x0, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab87"}, 0xfe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) mkdir(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, r0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:30 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80d", [[]]}, 0x1f8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) write$apparmor_exec(r1, &(0x7f00000002c0)=ANY=[], 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) 04:13:30 executing program 0: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0xfe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) mkdir(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, r0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:30 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80d", [[]]}, 0x1f8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) write$apparmor_exec(r1, &(0x7f00000002c0)=ANY=[], 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) 04:13:30 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x223) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r1, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x6f, 0x1, {0x1, [{0x14, 0x2, 0x4}]}}, 0x16) write(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:30 executing program 4: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000000c0)) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x2c001, 0x0) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a00000000", 0x23) write$apparmor_exec(r0, &(0x7f00000002c0)=ANY=[], 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') 04:13:30 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000001b80)=ANY=[@ANYBLOB="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"/709], 0x20a) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x6, 0x8, &(0x7f00000019c0)=[{&(0x7f00000004c0)="541486dfb7b61eb50dc89628671c6e518ecb4076b5a4c5c50adbab2903315232607cc901fc8ed87824d2d58b90cecaf56a9bba2fdb3fccef95cf31e5f3bdb04365bd00046f5d15121a1ea2d58bf514319b625bec4e46dc21f6d18b41ec09692fb7f7a954f8633a41c6e7e3a52ecd4812a8e9cae78b01209b72b7a4d8b498a03789f4bae98438641a260b358dbe5eca353c2f6af697d516dde336cea7c999c46135837134c991359873b5ede392ef1dd57d7facc2f13dff8947f0c14f3974dbc87ad8aed8a66dd95fb3916b26fb2c75cadd584a1dffb5f9e1a67ef7b56d1ff53390a148e3959355ec9ac1dd5286c99ad0fa483e", 0xf3, 0x7}, {&(0x7f00000005c0)="af2e1c415310099912cef335b73e95f15e6fa749567c65741081eb97e7ab919ae3496c7e347997315ada961d9e5762688bcd0eb922addc5b8b1c6fb8bbf0ae401111fd991c7ed65146d0b60ae856187c07b016025318451f28be34825bc203b1cbabb40dfac963344cbc5853676d84d63c0bb919da711e8658d7f26539d2182aaf99eb2f5501dac2e9c24f13bf791bb157e7dbb1626719debc1b56fc15e865cb46328ea0b2c6036f6cb3eadef770ba7d864e9d3033cb5066e4379a84cc6bff1f2544cac96dafaf0100cdf57aadd9b5f093399ea32f18170107c09005cf5294af3ab8f8e0aef535aa519dcb9440425737", 0xf0, 0x4}, {&(0x7f0000000180)="5baa026c7ffaa8d0fa25aac8782962736b7729c6cd67fbb4", 0x18, 0x1f}, {&(0x7f00000006c0)="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", 0x1000, 0x2}, {&(0x7f00000001c0)="8082f96315", 0x5, 0x3}, {&(0x7f00000016c0)="a7dfd215fc1947caf9d5a2679c5737b38c5de19e8063064a6038c5f8e77af50acfe9c1d168910867afb1d403fcf9f53f8570af540ca60f39b8da21f2b35468743d22023e27f34b32853121c952d80f50290bf15593edfe6d26d666349848fe8d9adc6193a17d18d4ca19995deb1c1b5fd4dd2b37aa41bfde9b9bde92c5f6f35ac914b15ce3deefdbc8dd118e729a5873f6c3c10a25d12de19cb1d55a07743999dbd2a413e1524d33ecc2ee77d0e55355665a69df09e980a1dd937e651132fbca20e5a86b8eab00a46d6a7287b3dfd02676bbbe660ad632f70ddaf6748c6e8f2c7fb5a6b4fa9064801ec141", 0xeb, 0x8001}, {&(0x7f00000017c0)="0edfe3311fb5c3570542a72168a447a9440fb347e986286ae71da33c2d9dcd4ebde97801cb45d815f680e161a99dfdb3f92c6fefcb1d28cf335af09c5d8160fa67674c77d1439ce5fdfe22b0d4e0f9ee490634b1dd27ab69bfec03974ccc06f50a30298fe8dd034c23bb3ef6dee28cff6a38a581949232730076050ae845fbf60e827f34d1259adfae6c757f223477a7141039dee4b9883314a6f8acac4a922511d7bb3c9b3dfcb507f92419841fb25120f117c78c6633b2ab00043fc98901f795f35df59408150ddf20226f873f30da", 0xd0, 0x2f93}, {&(0x7f00000018c0)="5f0898ecd3f279b07ce1a25a93f6feaf4e045f5ebe1028911c44964487bcba9ac17fc31a543528483b0c5b33244c5fc4381181cee1bfabbede9bc8b01aaa0f95bfe88cdc03b03f231e4225f2bad77ca06c5f59570613cf18078cae877c820b62fbe277c78d6c760a57182fd21dd6565fe2b0a82e3185fe337623a27c2dd93dfdfc8192e57971436a496d8e4e5fb22bd7ab771ee2020e51fa23648b449fa45a6eca54c0810c62718306b95a8a19eef580d5f3aa16638717ea2ee5a62897d9a4acfaefd189844d", 0xc6, 0x3}], 0x20, &(0x7f0000000200)={[], [{@subj_role={'subj_role', 0x3d, ')]'}}]}) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) r1 = syz_open_dev$mice(&(0x7f0000001a80)='/dev/input/mice\x00', 0x0, 0x800) getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, &(0x7f0000001ac0)={'filter\x00'}, &(0x7f0000001b40)=0x78) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) ioctl$PPPIOCSNPMODE(r1, 0x4008744b, &(0x7f0000000280)={0xfb}) socket(0x0, 0x400000000000003, 0x0) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') socketpair(0x9, 0x6, 0x0, &(0x7f00000002c0)) openat$full(0xffffffffffffff9c, 0x0, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000300)='/dev/null\x00', 0x100, 0x0) 04:13:30 executing program 4: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000000c0)) openat$full(0xffffffffffffff9c, 0x0, 0x2c001, 0x0) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) write$apparmor_exec(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') 04:13:30 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x0, 0x0, 0x9, 0x0, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab87"}, 0xfe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) mkdir(0x0, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x600, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="100025bd7000fcdbdf2504000000300001000c0006006c626c6300000000080005000300000008000900120000000800080000800000080009000b0000000800040002000000080006000700000008000500ff030000"], 0x5c}, 0x1, 0x0, 0x0, 0x8000}, 0x20000000) write(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') io_setup(0x16, &(0x7f0000000380)=0x0) io_submit(r4, 0x2, &(0x7f0000000500)=[&(0x7f0000000440)={0x0, 0x0, 0x0, 0x5, 0x9, r0, &(0x7f00000003c0)="fcc3a1a486c13b789e1c6272d9279a1516e0ae5ea56b8e0c429b79b9f1c799e1cbde1eff09fcb088317c2d6138ad56d5d6bebe8480bcf3daf83a3039eab72141169a648661b3f081", 0x48, 0x9, 0x0, 0x1, 0xffffffffffffff9c}, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0xb, 0xfffffffffffffffd, r3, &(0x7f0000000480)="03", 0x1, 0x2, 0x0, 0x0, r3}]) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:30 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/525], 0x20a) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) fadvise64(r1, 0x0, 0x5, 0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0}, 0x0) fcntl$setown(r1, 0x8, r2) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) setitimer(0x2, &(0x7f0000000180)={{}, {r4, r5/1000+10000}}, &(0x7f00000001c0)) socket(0x0, 0x400000000000003, 0x0) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) fcntl$getown(r3, 0x9) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') r6 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$F_SET_FILE_RW_HINT(r6, 0x40e, &(0x7f00000000c0)=0x5) 04:13:30 executing program 5: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x223) r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r0, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x6f, 0x1, {0x1, [{0x14, 0x2, 0x4}]}}, 0x16) write(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r1) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:30 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="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"/579], 0x243) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigprocmask(0x1, &(0x7f0000000100)={0x169}, &(0x7f0000000140), 0x8) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r1) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:30 executing program 4: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000000c0)) openat$full(0xffffffffffffff9c, 0x0, 0x2c001, 0x0) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) write$apparmor_exec(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') 04:13:30 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4600089c23060000000000000002003e0007000000b8000000380000002a02000005000000070087b40200ff01020000f00000000007000060ef54082e000000000000060001000100090000000500000009000000a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000976c76d22a07340afd071ddd64bdeaf2000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000005b84fd507b332bb783d228464f1f4a6d89c680f016453b3ff058e3ca7c807b480885eb288edd609a77c85b0bb4ce86698012152b3131f04861524e07773dd4cadacabe070a40fbfaf6e8b7895c37d71d040a74b404e1e7ff91768339d0828000"/628], 0x20a) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/commit_pending_bools\x00', 0x1, 0x0) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x4e23, 0x7, @local, 0x6}, 0x1c) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x9, 0x1c, 0xffff, 0xfffffffffffff801, 0x0, 0x7, 0x4100, 0x1, 0x75e0000, 0x2611, 0x2957, 0x5, 0x3ff, 0x0, 0x136, 0x5297, 0x5, 0x184000000, 0x401, 0x0, 0xfffffffffffff96a, 0x7, 0x7fff, 0x6, 0x5, 0x200, 0x5, 0x8d, 0x1, 0x631, 0xffff, 0x0, 0x3, 0x4ef, 0x6, 0x4, 0x0, 0x0, 0x2, @perf_config_ext={0x9, 0x3}, 0x80, 0x200, 0x8000, 0x6, 0x0, 0x40, 0x5}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x200, 0x0) ioctl$RTC_PIE_OFF(r2, 0x7006) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) socket(0x0, 0x400000000000003, 0x0) write$apparmor_exec(r3, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') r4 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$describe(0x6, r4, &(0x7f0000000180)=""/99, 0x63) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:30 executing program 0: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="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"/270], 0xfe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) mkdir(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, r0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:30 executing program 5: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x223) r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r0, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x6f, 0x1, {0x1, [{0x14, 0x2, 0x4}]}}, 0x16) write(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r1) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:30 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80d", [[]]}, 0x1f8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) write$apparmor_exec(r1, &(0x7f00000002c0)=ANY=[], 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) 04:13:30 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="7f454c4600089c23060000000000000002003e0007000000b8000000380000002a02000005000000070020000200ff01020000f00000000007000060ef54082e000000000000000001000100090000000500000009000000a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae19660a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf8000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e02230953d1f3bd32bd1033c772c33f46526b47feef546c7832985fa31006ddae3ae36b6669dc8f6c913cb698123a0594090807b46d98e9fa0213010656e2b9abe2383fdb8688c24a5160c61435dcf9fa0737de3108b6aa7c690f27511709e6c92b90467f200"/623], 0x20a) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) socket(0x0, 0x400000000000003, 0x0) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:30 executing program 4: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000000c0)) openat$full(0xffffffffffffff9c, 0x0, 0x2c001, 0x0) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) write$apparmor_exec(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') 04:13:31 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/586], 0x243) r1 = geteuid() fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v3={0x3000000, [{0xfffffffffffff001, 0x7}, {0x9, 0x1ff}], r1}, 0x18, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) mkdir(0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000000c0)) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) setuid(r1) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r3) r4 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGBITSW(r4, 0x80404525, &(0x7f0000000180)=""/113) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) syslog(0x9, &(0x7f0000000280)=""/69, 0x45) 04:13:31 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7fd, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x60000007, 0x2e0854ef, 0x0, 0x0, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf8", [[]]}, 0x20a) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x220201, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) socket(0x0, 0x400000000000003, 0x0) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:31 executing program 0: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x0, 0x0, 0x9, 0x0, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab87"}, 0xfe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) mkdir(0x0, 0x0) r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) setsockopt$inet6_tcp_buf(r0, 0x6, 0xb, &(0x7f00000000c0)='x', 0x1) write(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, r1) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:31 executing program 5: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x223) r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r0, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x6f, 0x1, {0x1, [{0x14, 0x2, 0x4}]}}, 0x16) write(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r1) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 285.490919] audit: type=1400 audit(1560831211.107:25): avc: denied { syslog } for pid=22528 comm="syz-executor.3" capability=34 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 04:13:31 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="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"/508], 0x20a) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) socket(0x0, 0x400000000000003, 0x0) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:31 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0xfe) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) fcntl$F_GET_RW_HINT(r1, 0x40b, &(0x7f0000000140)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) mkdir(0x0, 0x0) syslog(0x2, &(0x7f0000000080)=""/135, 0x87) write(r0, 0x0, 0xfffffffffffffdef) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:31 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x243) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0xfffffffffffffffa) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r1) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:31 executing program 4: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000000c0)) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x2c001, 0x0) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) write$apparmor_exec(r0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') 04:13:31 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x4000000008000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x0, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}, {0x60000007, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x243) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) r2 = accept4(r1, &(0x7f0000000100)=@hci, &(0x7f0000000180)=0x80, 0x80800) getsockopt$EBT_SO_GET_ENTRIES(r2, 0x0, 0x81, 0x0, 0x0) mkdir(0x0, 0x40) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000240)={r3, &(0x7f0000000500)="474423c59ba8e944bf7c40d53a812e193a887f8ec85039ed18f31c7f41bf3ad5440a4b6628b24c06380582041bf9f5f42f34632e82e3721564227f1fb64bccaa521867030eba4c7babff57014d023120ef7d5de81d8163a71c3dd810b9d83ae7f6cbe76c726e6634647b381b67dad7d783", &(0x7f0000000580)=""/255}, 0x18) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r4) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:31 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80d", [[]]}, 0x1f8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) write$apparmor_exec(r1, &(0x7f00000002c0)=ANY=[], 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) 04:13:31 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x60000007, 0x2e0854ef, 0x0, 0x0, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf8", [[]]}, 0x20a) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) socket(0x0, 0x400000000000003, 0x0) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') faccessat(r1, &(0x7f00000000c0)='./file0\x00', 0x10, 0x1200) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:31 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r1, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x6f, 0x1, {0x1, [{0x14, 0x2, 0x4}]}}, 0x16) write(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:31 executing program 4: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000000c0)) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x2c001, 0x0) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) write$apparmor_exec(r0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) 04:13:31 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x60000007, 0x2e0854ef, 0x0, 0x0, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf8", [[]]}, 0x20a) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) r1 = accept$unix(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000180)=0x6e) sendmmsg$unix(r1, &(0x7f0000001740)=[{&(0x7f00000001c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000016c0)=[{&(0x7f00000004c0)="23ae8120463b27f53a78b6c1ed75601ae609de2293ee07a914ff5989cae8f04f914c26761481a3983e1c82f71817c3677283fd22a1bc3e1292a2c269a8f922a6d8128404408110396c2f3fcd4298afbd9a7380b1f5621ade32e38e25c1767f6fce9b38f52a8c5d353c115c8e4ef37d3ae2e6ee8b3a1da21d706740c15df7909b8c564ad4eaaefb5c03778d35359a44", 0x8f}, {&(0x7f0000000580)="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", 0x1000}, {&(0x7f0000001580)="0c8608e2301e63d67bb80e0774a67c057a088017ae4b55d01e8ee3561aec615f982a12bc08c1f844874366a13e8a8f4d7f94ec0c65db6fc4f717fe2549c8e31e425f2d57afb87a44193a16bf504596f91d2a7aa8de9ab4e528964f7a12648e7cc3d94cf8a565891c6067dd8af4b27678b0f5e4fad84bb7b619a4b45dae87ae94ddc712295217d3518f80dd88f7a8ee14dda25f1b765dd613075524c10aead8c267d5cc6282ef2bfd8c670e9df6cc58f882c4706c4d7fcb9590da01b701124f5673bfa3790f78b946e78897cd16a621c1bc", 0xd1}, {&(0x7f0000001680)="c40444879ceb32a570ee62e0cd7a76ccdbc3185d84aa76f966", 0x19}], 0x4, &(0x7f0000001700)=[@rights={{0x1c, 0x1, 0x1, [r0, r0, r0]}}], 0x20, 0x44000}], 0x1, 0x20000000) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) socket(0x0, 0x400000000000003, 0x0) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:31 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x0, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}, {0x60000007, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x243) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/psched\x00') ioctl$sock_inet_tcp_SIOCINQ(r2, 0x541b, &(0x7f0000000000)) fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(r1, 0x0, 0x0, 0x80802) 04:13:31 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r1, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x6f, 0x1, {0x1, [{0x14, 0x2, 0x4}]}}, 0x16) write(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:31 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x60000007, 0x2e0854ef, 0x0, 0x0, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf8", [[]]}, 0x20a) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) socket(0x0, 0x400000000000003, 0x0) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) pread64(r1, &(0x7f00000004c0)=""/233, 0xe9, 0x0) 04:13:32 executing program 0: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x0, 0x0, 0x9, 0x0, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab87"}, 0xfe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) mkdir(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x2500, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='fd/3\x00') chdir(&(0x7f0000000080)='./file0\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, r0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:32 executing program 4: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000000c0)) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x2c001, 0x0) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) write$apparmor_exec(r0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) 04:13:32 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x60000007, 0x2e0854ef, 0x0, 0x0, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf8", [[]]}, 0x20a) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) socket(0x0, 0x400000000000003, 0x0) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) 04:13:32 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x0, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}, {0x60000007, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x243) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) dup2(r1, r0) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:32 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80d", [[]]}, 0x1f8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000000c0)) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) write$apparmor_exec(r1, &(0x7f00000002c0)=ANY=[], 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) 04:13:32 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r1, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x6f, 0x1, {0x1, [{0x14, 0x2, 0x4}]}}, 0x16) write(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:32 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="7f454c4600080023060000000000000002003e0000000000b8000000380000002a02000005000000070020000200ff01020000f00000000000000000ef54082efcffffff0000000000000000090000000000002b00000000a3d371d99314c44da8835dbfc490655cdfc8bedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b781f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab87"], 0xfe) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) mkdir(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$LOOP_SET_FD(r2, 0x4c00, r1) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:32 executing program 4: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000000c0)) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x2c001, 0x0) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) write$apparmor_exec(r0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) 04:13:32 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, 0x3e, 0x0, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x223) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r1, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x6f, 0x1, {0x1, [{0x14, 0x2, 0x4}]}}, 0x16) write(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:32 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="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"/490], 0x1ea) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) dup2(r1, r0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) r2 = socket(0x0, 0x400000000000003, 0x0) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x2e, &(0x7f00000000c0)=0xfffffffffffffff7, 0x4) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='security.capability\x00', &(0x7f00000001c0)=@v1={0x1000000, [{0xffffffffffffe862, 0x9}]}, 0xc, 0x1) 04:13:32 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) r1 = syz_open_dev$sndtimer(&(0x7f0000000100)='/dev/snd/timer\x00', 0x0, 0x800) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000140)={{0x0, 0x0, 0x1, 0x2, 0xffff}, 0x6, 0xc05}) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x0, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}, {0x60000007, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x243) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000500)={&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f00000001c0)="b87af1f00353a0176933bdb5a8f33a125bb11c505000d9cb5c58b6812880760503c532bf16f0cd3e1df36963acd93b4613e143537eebf27f23553d2c9af563db28ee0c77516c266bcc3ee3a7207460497676e33893cda50d204a80fbb0b65a1d652aef6e2f74db21e97dd998322a477eb288ac1bed0f426788a77038c6a8e384cce19206c5c3bd9160081e606ed2e968c0648f1cf52d0123656cbae3045a0ce0d38919dc96e9b6", 0xa7, r2}, 0x68) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r3) r4 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(r4, &(0x7f0000000680)={&(0x7f0000000600), 0xc, &(0x7f0000000640)={&(0x7f0000001140)={0x16f4, 0xd, 0x0, 0x20, 0x70bd2b, 0x25dfdbfc, {0xd, 0x0, 0x8}, [@nested={0x44, 0x15, [@typed={0xc, 0x52, @str='fd/3\x00'}, @generic="df3cd0eebd025d6b400a9b8edee6464e1921b920a28148b3e87b0de388d78bb0d8823d2655e9520a652f757e6f198e5c7677cc03"]}, @generic="a17fbb0827d391f2875f1cc329ac187a133e29fbcb3ede15caaa6c250eab0c9581dd902c56d08b89cdb2ded6e5cfd3d28c5dcf4c6acb29637ff9e69d6b3eb2349df820271c2bfeec6d0f7b0d3c5a3df39ba1e9e5293afcb3245627188e0d42b2364ae10a6a8ce7159ca0958c977c7f056aba002c4355d39ef88e8ebf0f98d37fd75859e03081c9ac0d747eae209678b9a2f5c07731c12243b1aa9de76b5e02b1", @generic="f8cca9158a61b8983b06f6fa4cccf2544fd644a35aff67dacb997ef667440ad6c566cf3d97c1b52a07b5493a24993ba4d2fb4d558e994c486f8da365f6977e9bbcb7df2ee6201976796fa2cb01beb8eb403fa29ec859eff576", @nested={0x17c, 0x44, [@generic="99cc0a307a82037ca7a9149e25fe18f22c5aa7d0cd8cda5cb49fde04d1abbbd7cab7a6095cc2f09f43ba1cc4000064ef9b5baf7e01fd1a0b1057f886b938a5e7818e0ea4055a1821c502b922f1c2aafe6f842c9dc80fdd03624e74452f29b547bc93d271129dbf171e6a234723d0cc8056d1e2d2bf4ff140fb287d9058f28b8b4ce104630e63312a1b17a207675c2767ffb9cf1bd2f58d734719e41089968fd9b3f1a349888a89d028d54d7ab2b994f1075b9532f4edb4580a848ed4dc3f013edc7451d9dea4ee3f8b7b267a57450d4a21cc3d71f669e2b2004b7f1c", @typed={0x8, 0x46, @u32=0x9}, @generic="99ca27d03ea44f12fc5e75b04ef87684002a04f1144606878f2e6fd69edb973d644e203c7a93c2a34c790e6d5a8704fb4f985add55c31b18aa2e38cce5f8437dc54a1fc4dc91eb5927520faa6bad2642f450b1d8e72dc2b198d00c634a808ec7121416ae1cb4856d9b44a6d9d329ecd64a157822c7c298304417db4e06ff2e8c535afad4216dca3fdf06947a4f44753baed0"]}, @generic="573ba1b6a54badc08d65f4a7f4d8ec7229b720b697ab5c52513743a0f4d56ca2753c140d0f6d9777587153e1c4adedb6f142ffe6fbbfd46bdb9361348f4e5a297e9fd814385ea8b5854dd96173d5cd90feec0d2559b6fd481fbbfcf02665ba8cf84162b62a995ea22a320ca25f1e9068a7944e4429930fa93ba4e4a7232ce06879aa450d492a67049dcebb285b2a6bcbdfdf857df77379ad6342667bfb10d56782490bde71124a112d83", @nested={0xa4, 0x3f, [@generic="c5b767a1b022acac6b393a56008d252910c796abecc9e0bcaaa0ce5dd44bb35b5e5ddc5b3960b51795f248e8beb6e81d4723817c3e8bfb482e6b4e216969fdd1f23802a5de325dfe15d29fd813d49ca2f634bd0a603a3caf34e01e0506b9a2b4c056bd1886ebaee099c06d00375b2510afcd21540b5a34629ed3db26a1d9dc1dec71f9c5cdb6830b79f4a94ac3b31184bbd7f3d6feda84055bcfb0fb61719764"]}, @nested={0x12d8, 0x45, [@generic="4f1b", @generic="1860c2c3644d4eccba46c85d35abb70ca6bc0e429638eff744594bded7ceb364387e891e9660b71de7c30fdd39fbfd8272892ba398685c68483f31b86321e6b205298abcbec1085af634bfba024853c54b5dac9fbf36a8f2d01606c88e4cf0098fa33349ecd47ca9de8968fcec9ad95ebf0d30edf3e4adbfe6d4e5637a2332fc3973999eafd55310860a8c0b2ff78aa2aa85778e245625832e693a1497369dd7314523a37d7dc2f2638a323b26ac4c62e1e44d548aee871c0de0b69f8aaf170ad74bdf9800c48fb674f36ed2a0cce983f70e2a556fad8466967457e5f1b86bf2", @generic="20117edf9b61748aa3baa6fe0a1b6812adaa75880526eb9c1717e211ea2c09d2aad20a407189d292b8e7c7e5dc3250a362b739b9f041f65ad66da2432f651710ef074325a5e8865932da96a31e3fcce0bd", @typed={0x8, 0x5f, @str='\\\x00'}, @generic="36ec66344d5611191e2ed2c1267ae3237b9553389775e49ba6f6ef7d6a4effddc7119a65654af1215c99443387db6d18b4e52388cf76451602defc8ec959491d50799fc65a625aed9ce0607bd91499bfabba92cf166a7c42419ccf2ed7c76c56fd4c488028b8b45ded0579e167cf4fe8b7fc48641757643774e30ecead2d10358e567ae12c6afbe80df36611ac95af95b6d79f32a957efe8f06bff3699269e9e18d38700dd55b6e3f16e984f5aaf1e26507e7375482645b1dabc147ca24e5cdf56a70b2ca53fcbd739ce03b3f5818a6ccbad72c12eb8c8979506313daad8c5560d9517e3d036f359143df433cd94fa8137cef0ac396bb6956d96f43da764c308b46bddfdf833883f3846910a9e95e016ce505e698369df9cfa378e94848ac831f036db1b96cc219ca84db3fdc00087eed50b6be6433c18a4859517ce511e3c24369ba83266097143997468273161c1a58699b9d07ebd83409fa20aea3798d5a21aa1ee518a18b2d0078df97ccd96fd1549cd624f48b605a4667ca8ac2a54a3cc929586b16004f23e9633f03ebba112bef4752b5f45a68d2ee44666ffaf5b6b03a63de22c3dd94e7a8b9bf076c4bd7cc422473cc214758b54bb22b4bcf2d82de119b308a5b06fd29213bca061d02d3ce4fb6488c2cc2fefe2e2111ae24bf64519233fa0e094ce84b21a8c145b931a854abca3096fc8c1ef5f4c85654653df12da1c99427a50f311b59f89fe06ea52da4c0eda5779140f159a29655064b470a020875723f1216b30c4792d8731f63cc38122322d35f2036e64cc0d64c3edc743ac94be91c4181ed2bcc3c461f88cff03f706d22244577ca114f6a133cbb448cef892edcd062790d7a26f716430651bbb51376dda85c76fb459c6f60a63cbcc74c526e433c7993ad7623dabb03087976d58b1b51e5527a61bf41d92c2b99705be6337933b85c1a0932a0e44c14013481a16bd380cf897ba1b90165bc9c83e301479106bc8657bc8d2795a34031c8c42c1e4dd611720fd15a64675218a4e8fe162cb3a7646b42cc717fcd54822c678fb8bfcf0c2714a3783b7741d19c2ae8131b99e1d44a4e7c47fa5e0cee5d4c0f6720562588f0f8ba095a5ec71b405a155463231f31a07fcb9dfe74f682c1846e53fdd6bcefa1951a9ea02c5caaa6b320abc92d0173a15fd6be55d83a1c0403258e8497b7b846bcb2fceb34052b701095d4f08b762e3d01b78dfbbda5b88acd261955e9c49f156516f062dd1dafd06e8ba2d4dab8812897052e80c5ca67af4ca6452bb49d091ca7704b2de5cf75579024fc4bca4f45ae8845f98eab46886baf31a59ab45fcf063ba4345e133cd182ff9d8e9eb35b8ac8a97104a8a221d10d7965e3c465d4773ba101b806c38f502e12e71300e537a64127824ef543d7a655f46efa2a0564165d58b5bbaf5fc423c48d122e3fe3239d2efaf2386fe42100e90876bfef6dbe65a06b95c50d4600282a1c69824531e166135bffa7327b8a81216d5ce922a2e967bdcd32ca8c2ca60830f643c2a5800ab6fdaad202e9c1c52df06fe4c90064f7421a9debf5a45a908060794116ac26515befebbbf418453c951beec5b379b1791ba5de42b8e79e53fabec604202b6e6f46ce378bca0caa6ff612ffc257eaf6fddb5477b73c04cd86a0b3ee292a7ff4f086256e295d76ea221594d050152bbc377179f3f0000ace1569c516f3be9513d33caf78b4b1ae850a531489515933b22a392325106c5a350192774a263d2016c417b3b534af2e2aae4a63369c6de88bf0898ba391f3fe372cf3c1ff74bae06d7e97deb972cefe40441047c5b1a3cfabc6a46cb86693f16159dd9d6ceb780780646aebf81812fc92e94069e2d095a0831802e8132d5a1ba9cda3361a6b7305e65a4dc30089b43a59712824a8860c82749c31cba1230d7a3ba36148d8830052f249319086e5e643b138fdcc7fd0717cd1bf524499f50642df508cff214338e698f3199b716c413dde21258f2d19f206e85e00dbd8c62be6695506a9339b9b84fc6a9f3b3b261d044ee99ab3e96cbdc237ad3732e86b14917c1592363aa550a0a1ea64732171fbcdb0869026eb3049a869b2f8a1c679178ecc24dab1a03c2623fc3342d02843a13214acb0ef2d8f51f1cd1fe0cf23f06294fda005ea8822d83837c19f11d19d20af44bf88a303951f6f403c84d372edc0d22b11d70fd54450672b269f5dddbd0f36233257570340afddec07a00bfdb02ee68bf317635105d17ad829692a7a62129de35023a79504857879fcb79688bc29140e7d45a546c6b5efa601cb2ccdd982f19b3c8c69cf98626e1157e9ad265be32c53e9631a360215b36e47c2ae44413781dd6081ea5c0a65dbcff0a0d6ce3bf86dd3e6621bc2efcf82019f4bbbadebafedbb8755668e0cabf07c3e753d1720da77a4cf5a04050018d413839d22eedc7369ce112180fbee2f1219cd8042b5ea599a11ab45563b1b6bb807a071202d8075c1eeb247da83f8172d11d797ba9764587eb8c5609f08580f46e243455ef871674cc71344d63aad5e846fa93b8311e1a7eeb4be84af96b23a33427cdc0d88348c55dc8e2660512e8812815459b47e4a174447b5a9a17d4070c6a1f3bb5540acde5994c6564dffbeee6d7b61b50ccc7e6049bae712131c4fe4f2f701cb610947ba79581eb50b66fa9661b65a6e738351cae44b78c9f955379ff2c27c43e1c539587605a44355eacba2a8db713fe5db9e5cd15f70969c45cf104c360db3a160827641ef0c1b0a91cf62341e436aecdebb55eb911cd03de98e6f9e49bddf0c12fd749bb0a28bc9d4768cea9375d82717f52f52ca4b0042c424d4c805335901bf071837cb372a62702d124406188c59f64976ef26f55b8b761f7d1397b102c2e0a4789758438959fbb61a36f429762dba1d12e35259497f8b9b4df07ed42c6d050daf586544d56fdfe06a93e63b1ea276afb3487ab73fc69c87428455c42482081f7c3bf0f8a4d720df323de692c2df55a341dc099aa0ee60d7f7262f1a738699ed1da509338a15b83bbf252f8be54e4eda19d59b2f1e9a5fc751b19845a84c309297fe16a2cfcd3a05157bfa72783191e42fd4791d07a45bcc367ad2349baa47ee2c302173182ba0db478a38ed943c6d999674cf24b161c157bf1835e96028c661acf1181d869fd65bfc70f6235af567f619c87523bcb1dbfa29fb3256241c685f76fcc34c256c5d3a0094b8a60a273da764ec1e2d52fd424fbf23e351c42a35963732767c5be988121ff9521cee29f3cb2c2d66a2578e5a049a3dca815c650a3d76d10483ea456dbaad67bdff26e2475e97c0f3aaab008b3ba86244676b3c22fc61a20ac291b3ceb3a4645bed8ebbe6608e34f15187ad2f201624712be1bb50cce008ff4e70eb8bbf5c56cf6aad856831cbc2539dd320d7f26ef1a20b897d72db2ff663b18f7fc8e7e9e315e20a268647d6dfa3c0443d0dbacbc77fa5c7b8de704dc4aadf6b07534a39b1ec87315818b837e7174396347b95ce4e9c045ead741802fe838430185c67b96562a45cf38a9145f869d206ebd7664eceed3a15203eb07c2f7cc879a78d7e92f56c624bffbab520d67d59e87b2b7d7636927c576aa9b3f943e82937e4bcb473cd674e4ea2e58b81c85f46ba4577f7b059b72118f1177866eccfe27c2bf4d6ff2da392a8746a2990311c14c6be6a3272b29b06f0d5e95f8652f82e1d2b3d9d8fae8ac0b15185a9db9897664e07d34bc74c156eb07f606ef7e6887aab736349571a5de759abc863a0426238bdfc86c9bfcb3aebc7a293178a3117390db3113286553cb0ae001d3623aabd93882bf71b6c3fb73a6412360273c7c858a7651c4fe8a26a42852d6c105c475f5bbddbdf5a6058cc500ddb45266d411aa1695e603acafdca8152ad779dfd9e2da21e8fefbe1941bb1ae09d86128f6c9b29af40e0fce24931656ba7145e94e54c746cd563c3f97539f81c83ddd6f55249858589567307bf2436b8b5044028b878998b094c7bccb9a6c7771504927c99e5d5e680916468a68d121680e73140ec007ca458262ec23183c7bf10c3d126538d417123e87ac72b58952e3e7d4e4b94804b1b5f6aecb173004efae6f7ccdc4214f34fc629e3351958f388b44a9c8c5e98d00905880d77219baa5c53d94f44b4c64c7e1ba724216dca51ce1ef13ad88debc23988fec9a4dabca7fcd0fc8ed82e6d4f5756dfab7fb82d35f64a72c44775295ff5c695226459de4bfde5ea5c194b85c037399b3ba13fc369e5760d10f8b0defdd24140df3c6cf953fec578a784515fbd11d767c9912f33c53176e56ce2333cef66bcfbacc461ef092e4a2752233fb4a78bc01fad75d5fc6b50254c15ce1ca5efba012f14b193b372d42ccd173ebc3ca8b1e76105d13f6e03cb01a65a8ae67becb1cdf6e02355d0923245316360bda47a1421c6c9242e93cfb769d5e4a793ad65ccaca15eb15997b00fd7e2769233cdb83fd813eeba28b14ef1e07279852b98cf38b7bdda4cec4a71f4a02ca1794c41150bfddc873b1ab4441eb68d697060c99cfae84e19e6bc74cb27b77e778dc0bbf8ed77268e782f9b6df9827ac8176f84ab572a92a6e78526edb566a96abacfffd4d3691ffc3cb24127f7c6499a9e7b8433ccbdf34b06ec2b9b0c788d97420ff9dca0f383d724691d97541c0bac4231e4e7d908f2d409486997d777896934ba8be454730ce45f2ea474268a6a73a9728b72735b1a8ff632360a46955ba966d8be0f3e2a3bea027c2516105bcabaa55c6e4b28a1a58a579c5a5ea1511435c726001b3da2cad92964bb4c4946a3c648ad32115f87e5c03e5e26a0539540cb46f12932ff131fa91dd590406514181b2f0add48b18c43e0a860f03853f672ff036b018f4fda2c2680c9fe50f2dbd16d8d79b8f56d222caeb8bee27354d297b3bcfda24ac0e35305454f51a309a4f5ba1c1e1bd7585863e7f1787e9654f14f570a2c52d471710dd7c04088af91fff335c943aff8da5b66871dd85c9d8bd1059e4f64c7f25f73e224b8c14df9a9fda356253dd23355afbd28a1d1011a78409ad3daaf714c3eb8b4629c268e6fe24a4bc0de5e1a81bae9a5613e2d7aa25a10d673cf2f42c2ac1e86cbbfc99c1b7043a6446a35d690508ef978470bd013db98f34f1c05097022906b36b98b518bc586be0679041566d8394f8f4b186de9867098c7060d54bdd17f255ba62ac986d59fbb0ed7ece0e3341e37d14cd158647d322b46d75ba39f30228225200674bb3a0a510dd57f57c34d36ca4f7c516c3096243f321b31f3dd1733eb40dd4c8e99ed3ac74f576a637ee76242146eecff617aec2b97fdd9c65baf7c371e00b2c76076c76ad482a2eb9b8c3f5b4ac40ab27d4fbea16c721a58abf6b6d291a1d21c7b54193a85ff1901c2ea9d9dc8e12d9c75a128753126d136bfaa8c2e25584d4f0a9ce308b2335f4ad866c16fabf7b30433c69bb4f690de32edfacae5e2238f556268a3ab74ff43631f80af598da7eb54a8940deaf85454128793d4561de16493243fe7354580f0ece2891564648f131328f35eefe2b104e869e9d51daeadff8c9463e0e43249817fd818fbff2b9ddc35001c213911e795fc1f0d7ff83a5d61e768c037fcd0a335a6dc30d5acd9b17a55160c5e402833e59a9566181fe3a4379db57739fa87ef5d4343550cf429aef3fcd23f3e060e3080ad6282070b5fe9ff2d647593074a92cb2287d7f35cdf7ef0eb1b66f9b67e4f94223b65a855dc14c25ba559211c2ee63b0fc5ce13658b5084457", @generic="cf7739153c2a64d92d31842d0962a96e2915f42b88f180e641fadd6d393fbdc4a12de9633bc4974a92fec80629633c9c17e3a30d71d496141f3ba802cd1337e31fae9c745b28372c4025ef5d50ea63764003626877827410cf7fee27f0b74cabb0fe5024d2bab3d87f09b1d82f5633f2fce40cb9693538f465bcc2891e6a54a64a3618c541be6afb7bee539e7b553c2759347be364c9df6f84f362d85c2f1c38708d5bcb5d96cac1c566512f62aacba54b92c494c62ceb5976b0c12212", @generic, @typed={0xc, 0x28, @u64=0x8000}, @generic="dfb1163d180b9d848213263aa9690e9eea6365a62aa6a188ce5f3ac2525c8079bfd97577f722ff7d23d70f2f1d998633760da1826f9b96432d7df2e32ac052b2461e7104b34e851f1b007a45b82462ed07b159e680b4f2c64c265375a6b66b0ccb5ca21bfeba4cf6d3aaefda254d526439892eccdc41c02e3c5d6fb70fa7df42113eb8a2050214bb53ffb6b76272b788ae16ce631f4457655453dfd1bfe7d7cfe6f3fdaa3fd0ad98fb3af5149811835c0ac73b9815e397169db218b0a8a50cf63f6d4abe4cb303d6faa49d28bb33"]}]}, 0x16f4}, 0x1, 0x0, 0x0, 0x40800}, 0x4008810) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r1, 0xc0046686, &(0x7f0000000580)={0x1, 0x44, "53758fb153c2bec1d7e6937a598b3a21fb3c7dd4d052596ddfc7734b270954bbde2a87d80de77b55ad08a409904fc35a2cfdf3678c18303efe979ba63e749a864060ae86"}) 04:13:32 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80d", [[]]}, 0x1f8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000000c0)) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) write$apparmor_exec(r1, &(0x7f00000002c0)=ANY=[], 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) 04:13:32 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, 0x3e, 0x0, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x223) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r1, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x6f, 0x1, {0x1, [{0x14, 0x2, 0x4}]}}, 0x16) write(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:32 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x60000007, 0x2e0854ef, 0x0, 0x0, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf8", [[]]}, 0x20a) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) socket(0x0, 0x400000000000003, 0x0) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) pread64(r1, &(0x7f00000004c0)=""/233, 0xe9, 0x0) 04:13:32 executing program 0: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x0, 0x0, 0x9, 0x0, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab87"}, 0xfe) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) flistxattr(r0, &(0x7f0000000080)=""/79, 0x4f) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) mkdir(0x0, 0x0) write(r0, 0x0, 0x1fe) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, r1) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:32 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80d", [[]]}, 0x1f8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) write$apparmor_exec(r1, &(0x7f00000002c0)=ANY=[], 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) 04:13:32 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="7f454c4600009c23060000000000000002003e0007000000b8000000380000002a02000005000000000020000200ff01020000f00000000004000000000000000400000000000080af34000080000000ff000000ffffffff07000060ef54082efcffffff0900000001000100090000000500000009000000a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0003eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e00"/579], 0x243) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0x80404509, &(0x7f0000000100)=""/51) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x80404509, &(0x7f0000000140)=""/104) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r4 = memfd_create(&(0x7f0000000000)='dev ', 0x0) fsetxattr$system_posix_acl(r4, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [{}]}, 0x2c, 0x0) fgetxattr(r4, &(0x7f0000000080)=@known='system.posix_acl_access\x00', 0x0, 0xfffffffffffffc43) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:32 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x2ee, 0x22a, 0x100000001, 0x4, 0x20, 0x2, 0x4, 0x2, 0xfffffffffffff000}, [], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf8", [[]]}, 0x1ea) r1 = add_key(&(0x7f0000000100)='trusted\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f00000001c0)={r1, 0xd4, 0x9e}, 0x0, &(0x7f00000004c0)="98b6f45596035c9ce8b6f22c9c5a1e2792bdfa248e815b8211e551055470380a12f9e88afad97e3dd83d79a7a488a679bb92ecf53aefd300317c6779b400563f3d66e40d92b0ac690c3583e2866c2954b8a7a87dcd78d6069d12c6f904fef20ea342b2e4a2f9e79f5c22b43931430717a140318e67384596e93296c880453a78bf025d9fd14878e7744db9b97ca6acdfeb7c35863b6a0db6245df929414654bc9eb2b7a590e915d85baa046bf3a8d34a614594ad0a83ad9dedfe5bcd7bdf581768666cf620cd4ee777f0a14bc084875fe0b894b2", &(0x7f00000005c0)="d1ce897fffed0ce95256761065d11fbd9a0624161b328ef007dbd99aed6ac056116a15290a23d84b7afe9811d0c9a079edfacbc07d9f8f978e32473ea2ea73ca6fc63bcec67e2bdbfbb08a66e9396c23ba9e884327185cc65ccc1de3c14d61ae4a9f5b2ca5a431efb516b25e45edbcb3436c7efb330e44db57f63f793464067050e21bae3c296df5c122cf4ec93e8913811f61170b80a1ea25b3133015c4") bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0xe4800, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) socket(0x0, 0x400000000000003, 0x0) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:32 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, 0x3e, 0x0, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x223) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r1, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x6f, 0x1, {0x1, [{0x14, 0x2, 0x4}]}}, 0x16) write(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:32 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80d", [[]]}, 0x1f8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) write$apparmor_exec(r1, &(0x7f00000002c0)=ANY=[], 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) 04:13:32 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x0, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}, {0x60000007, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x243) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) mkdir(0x0, 0x0) r2 = accept(r1, &(0x7f0000000100)=@generic, &(0x7f0000000180)=0x80) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0x532) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r3) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:32 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x7d510e23, 0x0, 0x2, 0x3e, 0x0, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x223) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r1, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x6f, 0x1, {0x1, [{0x14, 0x2, 0x4}]}}, 0x16) write(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:32 executing program 0: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x0, 0x0, 0x9, 0x0, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab87"}, 0xfe) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) mkdir(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0xdf) fcntl$dupfd(r0, 0x0, r1) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCSABS0(r0, 0x401845c0, &(0x7f0000000080)={0x3b54400000000, 0x7, 0xfffffffffffffffb, 0x9, 0x3, 0x5}) 04:13:32 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x60000007, 0x2e0854ef, 0x0, 0x0, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf8", [[]]}, 0x20a) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) socket(0x0, 0x400000000000003, 0x0) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) pread64(r1, &(0x7f00000004c0)=""/233, 0xe9, 0x0) 04:13:32 executing program 2: write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x60000007, 0x2e0854ef, 0x0, 0x0, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf8", [[]]}, 0x20a) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0xc00, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000000c0)={@initdev}, &(0x7f0000000100)=0x14) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) ptrace$getregs(0xe, r1, 0x49, &(0x7f0000000180)=""/165) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) prctl$PR_SET_FPEXC(0xc, 0x3) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) socket(0x0, 0x400000000000003, 0x0) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:32 executing program 0: syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c4600080023060000000000000002003e0000000000b8000000380000002a02000005000000070020000200ff01020000f00000000000000000ef54082efcffffff0000000000000000090000000000000009000000a3d371d99314c405a8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e10b9313612f61e47bc23a2a4eaadcd3ae1966a3816ab157ac46c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527061d6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80d"], 0xfe) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) r1 = request_key(&(0x7f0000000340)='blacklist\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='fd/3\x00', 0xffffffffffffffff) keyctl$invalidate(0x15, r1) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/mls\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r2, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) mkdir(0x0, 0x0) write(r0, 0x0, 0xfffffffffffffe03) r4 = syz_open_procfs(r3, &(0x7f0000000040)='clear_refs\x00') r5 = getuid() r6 = getgid() mount$fuse(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x40, &(0x7f0000000480)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000170000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB="2c616c6c6f775f6f746865722c6d61785f726561643d3078303030303030303030303030303030302c6d61785f726561643d30783030303030303030303030306661756c745f7065726d697373696f6e732c6d61785f836561643d3078303030303030303030303030303030362c220f47ecdd57ff4385616c6c6f775f6f746865722c66736d4f6769633d3078303030303030303030303030303030302c0000000000000000"]) ioctl$RTC_AIE_OFF(r4, 0x7002) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, r7) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:32 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x0, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}, {0x60000007, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10000, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x243) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r1) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:32 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x60000007, 0x2e0854ef, 0x0, 0x0, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf8", [[]]}, 0x20a) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) socket(0x0, 0x400000000000003, 0x0) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) pread64(r1, &(0x7f00000004c0)=""/233, 0xe9, 0x0) 04:13:32 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x60000007, 0x2e0854ef, 0x0, 0x0, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf8", [[]]}, 0x20a) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) socket(0x0, 0x400000000000003, 0x0) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:32 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x0, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}, {0x60000007, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x243) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d40)='/proc/self/net/pfkey\x00', 0x2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r2, 0x0, 0x81, 0x0, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000000c0)=0x1ee) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r3) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:32 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80d", [[]]}, 0x1f8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) write$apparmor_exec(r1, &(0x7f00000002c0)=ANY=[], 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) 04:13:33 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x7d510e23, 0x0, 0x2, 0x3e, 0x0, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x223) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r1, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x6f, 0x1, {0x1, [{0x14, 0x2, 0x4}]}}, 0x16) write(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:33 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x60000007, 0x2e0854ef, 0x0, 0x0, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf8", [[]]}, 0x20a) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x40000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/status\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2400001}, 0xc, &(0x7f00000001c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="f4000000", @ANYRES16=r2, @ANYBLOB="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"], 0xf4}, 0x1, 0x0, 0x0, 0x4000040}, 0x4000004) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0}, &(0x7f0000000500)=0xc) r5 = getegid() setsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000540)={r3, r4, r5}, 0xc) ioctl$sock_SIOCSPGRP(r1, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) socket(0x0, 0x400000000000003, 0x0) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:33 executing program 0: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="7f454c4600080023060000000000000002003e0000000000b8000000380000002a02000005000000070020000200ff01020000f00000000000000000ef54082efcffffff000000000000000009000000000000000900e900a3d371d99314c44da8835db84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0ac6581bac5ed73679607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf0568ce12ddc26842295399491c80da29aacb8ab87"], 0xfe) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) mkdir(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, r1) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:33 executing program 4: write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x60000007, 0x2e0854ef, 0x0, 0x0, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf8", [[]]}, 0x20a) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0xc00, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000000c0)={@initdev}, &(0x7f0000000100)=0x14) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) ptrace$getregs(0xe, r1, 0x49, &(0x7f0000000180)=""/165) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) prctl$PR_SET_FPEXC(0xc, 0x3) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) socket(0x0, 0x400000000000003, 0x0) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:33 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x7d510e23, 0x0, 0x2, 0x3e, 0x0, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x223) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r1, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x6f, 0x1, {0x1, [{0x14, 0x2, 0x4}]}}, 0x16) write(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:33 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, 0x3e, 0x0, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x223) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r1, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x6f, 0x1, {0x1, [{0x14, 0x2, 0x4}]}}, 0x16) write(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:33 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0xfe) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) mkdir(0x0, 0x0) syncfs(r0) write(0xffffffffffffffff, 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) write$cgroup_type(r2, &(0x7f00000000c0)='threaded\x00', 0x9) r3 = socket$inet(0x2, 0x80006, 0x8) ioctl$sock_SIOCBRADDBR(r3, 0x89a0, &(0x7f0000000080)='caif0\x00') r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, r4) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:33 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80d", [[]]}, 0x1f8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x2c001, 0x0) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) write$apparmor_exec(r1, &(0x7f00000002c0)=ANY=[], 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) 04:13:33 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x7d510e23, 0x6, 0x0, 0x3e, 0x0, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x223) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r1, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x6f, 0x1, {0x1, [{0x14, 0x2, 0x4}]}}, 0x16) write(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:33 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x243) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000080), 0x3) r2 = dup3(r0, r1, 0x80000) mkdir(0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000100), &(0x7f00000000c0)=0xfffffffffffffd5a) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r3) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:33 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80d", [[]]}, 0x1f8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x2c001, 0x0) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) write$apparmor_exec(r1, &(0x7f00000002c0)=ANY=[], 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) 04:13:33 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x243) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) r2 = syz_open_procfs(r1, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:33 executing program 0: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0xfe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000080)) mkdir(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, r1) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:33 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4600089c23060000000000000002003e0007000000b8000000380000002a02000005000000070020000200ff01020000f00000000007000060ef54082e000000000000000001000100090000000500000009000000a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc366ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf80000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000037329df35799b74a687d373e2f106056d0172b8606a611743dc0b7bc9d1486d61af70d5d62d2d0bdc02aabdaea27528426bea345e0e3ed28f44b"], 0x20a) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0}, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) setsockopt$sock_timeval(r2, 0x1, 0x15, &(0x7f00000000c0)={0x77359400}, 0x10) r3 = socket(0x0, 0x400000000000003, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0xa, &(0x7f0000000200)='/dev/full\x00', 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000500)={r1, r2, 0x0, 0x8, &(0x7f00000001c0)='em1eth0\x00', r4}, 0x30) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) accept4$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @local}, &(0x7f0000000180)=0x1c, 0x80800) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:33 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80d", [[]]}, 0x1f8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x2c001, 0x0) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) write$apparmor_exec(r1, &(0x7f00000002c0)=ANY=[], 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) 04:13:33 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x0, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}, {0x60000007, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x243) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r1) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000100)) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:33 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x7d510e23, 0x6, 0x0, 0x3e, 0x0, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x223) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r1, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x6f, 0x1, {0x1, [{0x14, 0x2, 0x4}]}}, 0x16) write(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:33 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, 0x3e, 0x0, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x223) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r1, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x6f, 0x1, {0x1, [{0x14, 0x2, 0x4}]}}, 0x16) write(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:33 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x0, 0x0, 0x9, 0x0, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab87"}, 0xfe) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe, 0x8}}, 0x0, 0xffffffffffffffff, r1, 0x0) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) r2 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000380)={'security\x00'}, &(0x7f0000000200)=0x54) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x100, 0x0) ioctl$TCSETS2(r3, 0x402c542b, &(0x7f0000000180)={0x3ccf153a, 0xff, 0x2, 0x1, 0x100, "6753aab2f0ee890e40d197cfde1b23f6de9d69", 0xfffffffffffffff7, 0x5}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) ioctl$RTC_IRQP_READ(r3, 0x8008700b, &(0x7f0000000400)) mkdir(0x0, 0x0) r4 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x200000, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r4}, 0x10) write(0xffffffffffffffff, 0x0, 0x0) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, r5) openat$full(0xffffffffffffff9c, 0x0, 0x1, 0x0) 04:13:33 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4600009c23060000000000000002003e0007000000b8000000380000002a02000005000000000020000200ff01020000f00000000004000000000000000400000000000080af34000080000000ff000000ffffffff07000060ef5408bbfcffffff0900000001000100090000000500000009000000a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f4ac475df09db043d898b8cc4020f893d190403e3405768a363f3f3aea661e3a0d6a8651533510bd5a1c7c64aad5d0d85e59ae26d4f6c0812d4fa11c76f2499763e1b5dcb2949cc230bb9449c0b7e4614c76b89128eb6490c0e4b3ed5b4a1d49fd752f5daca54f"], 0x243) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r1) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:33 executing program 0: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x200000000000000, 0x7ffc) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x0, 0x0, 0x9, 0x0, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab87"}, 0xfe) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) r2 = syz_open_procfs(r1, &(0x7f0000000080)='limits\x00') getsockopt$packet_int(r2, 0x107, 0x8000000000000009, &(0x7f00000000c0), &(0x7f00000001c0)=0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r2, 0x28, &(0x7f0000000140)}, 0x10) mkdir(0x0, 0x3ffffffffd) write(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, r3) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:33 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4000, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x0, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}, {0x60000007, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x243) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) mkdir(0x0, 0x1) r1 = socket(0x1a, 0x3, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:33 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000880)=ANY=[@ANYBLOB="7f454c4600089c23060000000000000002003e0007000000b8000000380000002a02000005000000070020000200ff01020000f00000000007000060ef54082e00000000000000000100010009000000050000000900000002d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342fecb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd9e27f412a59082ccb031619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8f8e82e1eed1527fc1c6ab14270caa657bd6d82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf80000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c9ed111f34b8568300000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000be3e000000000000000000000000000000000000e20000000000000000000000000000000000d8f6000000000000000000000000000000000000000023a0eed59892e8e98205052cf5f268adbdcc54ef1760b817537c50b2799cdcf9c1958f300102bcafc2d53cc551295b17b0e0218743081613f41e6f8ee2ed05329b0e9cb1c0bcaa945cdf62d4016903db26c9fa37e9aa49a0284908c7e50cdaf7ca111a2878ba9a816d30c37e7358918c0f531cf082e7cf53c8f8f0a747baa32c88dc4f9c8bf9ad0be85e90959d3f0cfb128f4694"], 0x20a) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x20) write$P9_RSTATu(r3, &(0x7f0000000280)={0x62, 0x7d, 0x1, {{0x0, 0x48, 0x1d2, 0x2, {0x40, 0x2, 0x3}, 0x0, 0x0, 0x3f, 0x7, 0x5, 'fd/3\x00', 0xa, '/dev/full\x00', 0x6, 'vmnet0'}, 0x5, 'fd/3\x00', r1, r2, r1}}, 0x62) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r3, &(0x7f00000004c0)="7e80b9495b1c4919099684ca90fb47978c39c69e084bc4d24da984700e6da666b37897107f387309c5734c828714d78ab082541a4f86cfa8a326e39cff61bb9c6d0c6b14c560d907b55fbe0ae19cb794b157b659dc309566ea1c59f7912bfb5a3ac62b107d0695f7ef053b3b8ed4947fc08842795037da0a88fbe0fb9d3d3a74a872880d8ee2936e3f2d3043772f4999126fc54453a5a3efb943f2314ff50d1c0f3e1e7c557c4554802d75bbf7b640b149d8f88d559b7fb79589771232a2c39622f72d0b3f88f83ca4a0134094f05a95", &(0x7f0000000180)="67395c937a8b51ba25bdd7c8cb64eb5ca02e6066851ce63f4134529874b30b5a91d4c6b4628aba0cbfde5da9559f771136b484c9edcc9579baa6ff712cd88b491ac1482523e26521b0a23b7e3decadc19913687682c2005df9f06e25d51bfd4a656f8b50ece1aaa6d2bc7be666d7d0898b"}, 0x20) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) socket(0x0, 0x400000000000003, 0x0) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_GET_DUMPABLE(0x3) 04:13:33 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80d", [[]]}, 0x1f8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000000c0)) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) write$apparmor_exec(r1, &(0x7f00000002c0)=ANY=[], 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) 04:13:33 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x0, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}, {0x60000007, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x243) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, 0x0, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000140)=0xc) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:33 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80d", [[]]}, 0x1f8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) write$apparmor_exec(r1, &(0x7f00000002c0)=ANY=[], 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) 04:13:34 executing program 0: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="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"], 0xfe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg(r0, &(0x7f0000000a00)={&(0x7f0000000280)=@nfc_llcp={0x27, 0x0, 0x2, 0x4, 0x0, 0x7d, "5fe997b5755571a4b573f7739be740368d4d1433da0c737385b2eb2531f55dad306b4b1bf8ce4350bfed6b501221ab749c208c1c96b7b359f12b4f6f33ded6", 0x19}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000300)="cd79b5444c6952a440e070cee69d5f41cc0f3177e3bbdbea050b016dd6d423af0fcdedf46f2e5d2444d2c4bf515ba61f4131754bd8898ffdeafbdea917cca60ceda10bae8ce6a1acbda05d569f5cc587ca89f1ed50ad", 0x56}], 0x1, &(0x7f0000000380)=[{0xb0, 0x19f, 0x8, "a522ed44ac2df228b533f317f2087a69bd27c1ad3b4c5045f1327d02678b79cda896f38f085e01b6b029efc1a5c266947f4b91d771613646013ba85fa769a8ca0aed4f70a9671ffde8cc2afe554d8a59271b2e766a6dc8fbd22a1592634a15d091d232ea927abe9e27165c598ecae0bdb327fa98c6e2d7712baa6e89f5828846ac6ecd0916b7d1d4f290974afff265fe2e9ad57388f8e9098b0c83b4fcb3"}, {0xb0, 0x111, 0x3, "b3ad5f7f28c702d01743ee3db0a41b1dd01f18080fce3a7f512ab322fd4679ad4c34868a3432f8ec36e7b16b2f6c5a1fd0af041898d86bcab29d1bac1fc4a9da1c01d3b8e901acc7583f2f8a632c56e166b289dad6f028f3663cefa986e31958d7bfb2a14b4d1341a4da161fd005e9edcc44260a87315286f9ad42e7ee8f2cf9f88a239eda4f77b6becd813608d3478dc499ee8e659668d180cf772a"}, {0xf8, 0x10b, 0x0, "898ca086194cc21e7d0a281c1c33fe9145daec66fab83f35cc690b8206506af144851fd5c397dfd30d518d44438268546d9edbe2d963a9d5c07a0a131c5ba686fc45b8a63d446dbb3849543ef4f64b4bd8af95d52727188ded76b4ebf61b6a7208dcf6d26db18cda3bbbc22a00c1935a343b7556ca2e136ea502c84e3b6a3301dd118a3f3f9504351ef1ee4a6dc0a321ebe651dd6136209f0e4393490800ae03e1b9d7260b8171799979ee26865378f9c9727badf69f7156735dcdc5218d73dfe1f196ca3a609fb954d00ec8061cd7e51e11d39300813661027a35c556d424f5830ffc9ec6534fd4"}, {0xc0, 0x10b, 0x0, "ce551b93090191c535de71075db67f147e0122c403bf4cf13f2b347cea5f862eae8ecac67ab447323d1c330e3c78fa0201ae1335048f7abd9c88856ddce4beec1b1365ccf6e089be7b7d06e845cfe8ece96dba4bc4df1cc2b5b373c3c44e5107330717e6ab8db821157f3d4a44d5a400cac44c9295e188bfa1c97d596680439aaf28bdff2c4b7962d11f848f8c7318e8626fef9111ebdfd0ac37d731edbc4789805849564cd50a118185956d"}, {0x40, 0x101, 0x4, "09a9995017fe05b41955ffb3923f4ad5ec05362c9b86067c3ffb9a8abe9b334f1571912deddd299d421a6143c07e5d"}, {0x60, 0x109, 0x9, "09dd0b47ba456bb1a3bb214be5ca6e6cfd604ec19ab97273137e6bb7dc589715d20842050d85a5f73557732be7684bdd4ddf737abaf0cc4ae6d9a5c9feddd5c73773c8d389a4ea967f9e34ff82423e96"}, {0x88, 0x13f, 0x7, "b526ac23482c5b75abe9959bd4c9281782156b944ddb38b96db9e4e46fd611c01672248bac4edbf28d4d53da052997e03d32b33bdb89b09066c57c8bc8614b9342a71ae74aaa05636f72c09cd33a9d06a714a1ede3f912f4cb3cd39867d265eae4c8937db8e902ff30bd9cb611851f5f50767ce1"}, {0x88, 0x10b, 0x9, "1c805d8446336877bdf64cd12044cc2510a7c7612d5c1960b07a70f155edafa1f4173adf6958102b7a54a5a0835682927cd7204c8a03f1b23cef2fe8a9f1650bbfe64f6b53e678714db63875cd1b2bec0c8d6c923d2fd191de4584f0fbadf6fb6a9225384c75dc2bbf3f753db51a8f859fb6e76dcf1b"}, {0xb0, 0x117, 0x1000, "fad4f9555666331a7dc81fc2023fcfb52e96f994527c80c3d82acac67d9e9c658f5df6f41cc84bcdefb6ba8f7ee7a3bbc850ec4bee0eea337d8a805813cd8f4c5cd5fc7041efb4d68cb13f79fb811a431ee71cc715f7cc09962076d53eb77d5df91883adfde6bccce6fb618588987783941a9e578c57cc09f1350747a44844c9a635de8dc0c0b65c8c83793b3be34bffdc2227029f99e8ba57"}, {0xf8, 0x10d, 0x7, "bde98c7899dde0e0e6ff9a81c5c472b69b45cd7304d4fde9d9a3579d8d59a6e2f7b6fad35670563992216fb459366769589a92c74c6acab517f018f143ba071843ab108c79cf438c2efc0b6dfbc0131576121e45208336bc137775b8a1d32abc606cbe98f19000a23fbb7e07bb46b9c4c3c36494683e62d93575524d21e572522c674f8806dd38506b74d3f4d9ba455e3ffa162a406a70ab5bc8ce7d61914fc920b6455efc50132542a94d2d805b583faed85d805789602f742014d6b7d30dc8eb5d23277e410a0b701381a5747c2dee424ac2f48654b54569f76f8944aa8dc2e338a5a7fc"}], 0x670}, 0x0) pipe(0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000a40)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000ac0)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r1, &(0x7f0000000cc0)={&(0x7f0000000a80), 0xc, &(0x7f0000000c80)={&(0x7f0000000b00)={0x148, r2, 0x6, 0x70bd2a, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffffffffffffff00}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x2}]}, @IPVS_CMD_ATTR_DAEMON={0x5c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xa21}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xfffffffffffffff7}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x2b}}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x6a8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @empty}]}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xb74d}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x1}]}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @initdev={0xac, 0x1e, 0x0, 0x0}}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}, @IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xbc6}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x3f}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}, @IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x9}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x8}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x93}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_to_hsr\x00'}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x4}, 0x8001) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) mkdir(0x0, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/validatetrans\x00', 0x1, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, r3) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:34 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x1001, 0x1) write$binfmt_elf32(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x243) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/user\x00', 0x2, 0x0) write(r1, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000100)='\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:34 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x7d510e23, 0x6, 0x0, 0x3e, 0x0, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x223) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r1, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x6f, 0x1, {0x1, [{0x14, 0x2, 0x4}]}}, 0x16) write(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:34 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80d", [[]]}, 0x1f8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000000c0)) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) write$apparmor_exec(r1, &(0x7f00000002c0)=ANY=[], 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) 04:13:34 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80d", [[]]}, 0x1f8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) write$apparmor_exec(r1, &(0x7f00000002c0)=ANY=[], 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) 04:13:34 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000440)='/dev/loop#\x00', 0xffff7ffffffffffe, 0x8000) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x0, 0x0, 0x9, 0x0, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab87"}, 0xfe) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) r2 = dup2(r1, r0) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000000)={0x0, 0x46, &(0x7f00000000c0)="627dafe7df3ab6f2da0e949c56eda951a4cd28c7896f8f6cc99aceeaa24df0d1651a0a02195dff5d20057a7c36e3e4b4cfacda6b90e37a0ccf3702825488ef081a133ae01c34"}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) mkdir(0x0, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000380)={0x98, r3, 0x203, 0x70bd28, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x1000}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x100000001}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}]}, @IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x5a}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}, @IPVS_CMD_ATTR_DAEMON={0x18, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip_vti0\x00'}]}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x6}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x6b182ab1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}]}, 0x98}, 0x1, 0x0, 0x0, 0x8800}, 0x4000000) write(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:34 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x60000007, 0x2e0854ef, 0x0, 0x0, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf8", [[]]}, 0x20a) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) socket(0x0, 0x400000000000003, 0x0) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') vmsplice(r0, &(0x7f00000000c0)=[{&(0x7f00000004c0)="c0bb464a11d74e9e81453a7f0ec91de8d6c2880a09567acef761637d16534db407b3674842aedfbcec23dcc4b93a0645dfa5e9c83a0b31363e7d02d9f2317bdcf15848bffa313136a4f8ebf2b8dfb3bb17efff0854f008b23bdf52fc288f3a544b7bc733e2d540daf2b639984b4585b52ea7275728a2a2e723d886b12e7d54acb67f8c5985a272f7df606605624c4efc06ae24057c769b42e908883fccaab8a8a3352b557d73bd6162f828d2488d246e15d17a5ee8ca5731da196f764346522d54", 0xc1}, {&(0x7f00000005c0)="abbbc1fa353580e745004c09fe80b1c3e50eb875b40b6f429d918290303ca832b5d27b4bd8be0034f6c1f04db593884cc509e2706b673c5e2f6adfcb1db2e0c5a134917455929201b81ff3d57d276c3c57f7bfbc37add01dbb42be603c58e978e88a6e8b224b0e9b5c5bb7291bb3589182bbc25a90907e69c142ae95cfadf4417bab2d6e624d8364613aa1ff4731e0242c9c153836af5e4287932793b1b4ba2852df6f3acc20e3368498434818a30432206d726ea99a60358014cfae59a2610513a3ea69a84a81e0337c191175bde43413a914c81e3bf54f8b1225b602d35e74faee1d", 0xe3}], 0x2, 0x2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:34 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x6, 0xb8, 0x38, 0x22a, 0x5, 0x0, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}, {0x60000007, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x200000000000009}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x243) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) write(r1, &(0x7f0000001100)="2480007ab36e55ec29edd00ee1000c0c000a0000000000", 0x27c) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') r3 = fcntl$dupfd(0xffffffffffffffff, 0x406, r2) shutdown(r3, 0x1) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0xfffbfffffffffffc) 04:13:34 executing program 0: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c4600080023060000000000000002003e0000000000b8000000380000002a02000005000000070020000200ff01020000f00000000000000000ef54082efcffffff0000000000000000090000000000000009000000a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab872908e70380deffca60795ce0648cb8fd368b77d23c1c18a00d6a6e4ec520fa160ad43184f2"], 0xfe) r0 = openat(0xffffffffffffff9c, &(0x7f0000003500)='./file0\x00', 0x80, 0x40) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000003580)={0x4, &(0x7f0000003540)=[{0xb14, 0x6, 0x8e67, 0xd9}, {0x4, 0x2, 0x2, 0xfffffffffffffff7}, {0x1f, 0x2, 0x7fc000000, 0x7}, {0xffffffff, 0xff, 0x7, 0xffffffffffffffff}]}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) mkdir(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, r1) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:34 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x60000007, 0x2e0854ef, 0x0, 0x0, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf8", [[]]}, 0x20a) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) preadv(r0, &(0x7f00000000c0)=[{&(0x7f00000004c0)=""/210, 0xd2}, {&(0x7f0000000180)=""/130, 0x82}], 0x2, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) socket(0x0, 0x400000000000003, 0x0) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:34 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x7d510e23, 0x6, 0x2, 0x0, 0x0, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x223) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r1, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x6f, 0x1, {0x1, [{0x14, 0x2, 0x4}]}}, 0x16) write(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:34 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="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"/568], 0x243) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r1) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:34 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80d", [[]]}, 0x1f8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) write$apparmor_exec(r1, &(0x7f00000002c0)=ANY=[], 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) 04:13:34 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80d", [[]]}, 0x1f8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000000c0)) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) write$apparmor_exec(r1, &(0x7f00000002c0)=ANY=[], 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) 04:13:34 executing program 0: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x0, 0x0, 0x9, 0x0, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab87"}, 0xfe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) mkdir(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) write$tun(r1, &(0x7f0000000380)={@void, @void, @llc={@llc={0x7e, 0xbc, "db", "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"}}}, 0x2bf) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:34 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80d", [[]]}, 0x1f8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$apparmor_exec(r1, &(0x7f00000002c0)=ANY=[], 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) 04:13:34 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x806, 0x204000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x60000007, 0x2e0854ef, 0x0, 0x0, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf8", [[]]}, 0x20a) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) socket(0x0, 0x400000000000003, 0x0) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:34 executing program 3: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x141000, 0x0) ioctl$GIO_FONT(r0, 0x4b60, &(0x7f0000000140)) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(r1, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x0, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}, {0x60000007, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x243) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) mkdir(0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(r2, 0x0, 0x0, 0x0) 04:13:34 executing program 0: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) r0 = accept$inet6(0xffffffffffffff9c, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000000c0)=0x1c) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000100), &(0x7f0000000140)=0x30) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x0, 0x0, 0x9, 0x0, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab87"}, 0xfe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) mkdir(0x0, 0x0) fstat(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000440)=0x0, &(0x7f0000000480), &(0x7f00000004c0)) getgroups(0x3, &(0x7f0000000500)=[r1, r2, r3]) write(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0xc3152c49bdeb5651) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, r4) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:34 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80d", [[]]}, 0x1f8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$apparmor_exec(r1, &(0x7f00000002c0)=ANY=[], 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) 04:13:34 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x7d510e23, 0x6, 0x2, 0x0, 0x0, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x223) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r1, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x6f, 0x1, {0x1, [{0x14, 0x2, 0x4}]}}, 0x16) write(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:34 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) r1 = ioctl$TIOCGPTPEER(0xffffffffffffff9c, 0x5441, 0x4) ioctl$TIOCLINUX4(r1, 0x541c, &(0x7f00000001c0)) write$binfmt_elf32(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4600009c23060000000000000002003e0007000000b8000000380000002a02000005000000000020000200ff01020000f00000000004000000000000000400000000000080af34000080000000ff000000ffffffff07000060ef54082efcffffff0900000001000100090000000500000009000000a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a562e3409c611900e4c93b2b440bd68a2082ffd4e82073f00c04ffefdacceaa4c31e5a4648ce0278a71acd257f9336be0fc40cf6a0e44d0aea98f85fad5ff41516fdbd7af796f9694bb1aaf49ca505bf97e7bce39707e660f041944a4c01669b76889ec472afbb7a7f13a490"], 0x243) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x220002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000100)) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') linkat(r2, &(0x7f0000000200)='./file0\x00', r2, &(0x7f0000000240)='./file0\x00', 0x1000) fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:34 executing program 0: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c46000800893b23060000000000000002003e0000000000b8000000380000002a02000005000000070020000200ff01020000f00000000000000000ef54082efcffffff0000000000000000090000000000000009000000a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb627adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab87"], 0xfe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) mkdir(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, r0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:34 executing program 4: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x200000000000000, 0x7ffc) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x0, 0x0, 0x9, 0x0, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab87"}, 0xfe) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) r2 = syz_open_procfs(r1, &(0x7f0000000080)='limits\x00') getsockopt$packet_int(r2, 0x107, 0x8000000000000009, &(0x7f00000000c0), &(0x7f00000001c0)=0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r2, 0x28, &(0x7f0000000140)}, 0x10) mkdir(0x0, 0x3ffffffffd) write(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, r3) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:34 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x60000007, 0x2e0854ef, 0x0, 0x0, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf8", [[]]}, 0x20a) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) socket(0x0, 0x400000000000003, 0x0) openat$random(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/urandom\x00', 0x204000, 0x0) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:35 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x7d510e23, 0x6, 0x2, 0x0, 0x0, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x223) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r1, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x6f, 0x1, {0x1, [{0x14, 0x2, 0x4}]}}, 0x16) write(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:35 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80d", [[]]}, 0x1f8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$apparmor_exec(r1, &(0x7f00000002c0)=ANY=[], 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) 04:13:35 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0x0, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x223) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r1, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x6f, 0x1, {0x1, [{0x14, 0x2, 0x4}]}}, 0x16) write(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:35 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x243) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x406, r0) setsockopt$sock_int(r2, 0x1, 0x2c, &(0x7f0000000180)=0x401, 0x4) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) r3 = creat(&(0x7f0000000100)='./file0\x00', 0x125) ioctl$VT_WAITACTIVE(r3, 0x5607) ioctl$sock_inet_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000000140)) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r4) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:35 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x800, 0x0) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f0000000100)=""/181) syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x0, 0x0, 0x9, 0x0, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab87"}, 0xfe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) mkdir(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, r1) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:35 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x60000007, 0x2e0854ef, 0x0, 0x0, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf8", [[]]}, 0x20a) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) socket(0x0, 0x400000000000003, 0x0) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') socket$inet(0x2, 0x7, 0x20) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:35 executing program 4: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x200000000000000, 0x7ffc) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x0, 0x0, 0x9, 0x0, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab87"}, 0xfe) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) r2 = syz_open_procfs(r1, &(0x7f0000000080)='limits\x00') getsockopt$packet_int(r2, 0x107, 0x8000000000000009, &(0x7f00000000c0), &(0x7f00000001c0)=0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r2, 0x28, &(0x7f0000000140)}, 0x10) mkdir(0x0, 0x3ffffffffd) write(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, r3) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:35 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80d", [[]]}, 0x1f8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$apparmor_exec(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r1) 04:13:35 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0x0, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x223) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r1, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x6f, 0x1, {0x1, [{0x14, 0x2, 0x4}]}}, 0x16) write(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:35 executing program 3: write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x0, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}, {0x60000007, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x243) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:35 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)=ANY=[@ANYRES16=r0], 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) mkdir(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, r1) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:35 executing program 4: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x200000000000000, 0x7ffc) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x0, 0x0, 0x9, 0x0, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab87"}, 0xfe) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) r2 = syz_open_procfs(r1, &(0x7f0000000080)='limits\x00') getsockopt$packet_int(r2, 0x107, 0x8000000000000009, &(0x7f00000000c0), &(0x7f00000001c0)=0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r2, 0x28, &(0x7f0000000140)}, 0x10) mkdir(0x0, 0x3ffffffffd) write(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, r3) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:35 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80d", [[]]}, 0x1f8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$apparmor_exec(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r1) 04:13:35 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0x0, 0x38, 0x0, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x223) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r1, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x6f, 0x1, {0x1, [{0x14, 0x2, 0x4}]}}, 0x16) write(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:35 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x2, 0x10000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x0, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}, {0x60000007, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x243) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000000)=0x400100000001, 0x1c0c) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x40100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() r4 = dup2(r1, r1) setsockopt$inet6_MCAST_MSFILTER(r4, 0x29, 0x30, &(0x7f00000000c0)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, 0x3}, 0x90) ptrace(0x10, r3) fcntl$setstatus(r2, 0x4, 0x26fc) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r5) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:35 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x20a) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(0xffffffffffffffff, 0x40485404, &(0x7f0000000180)={{0x1, 0x2, 0x2, 0x0, 0x13c53156}, 0x10001, 0x7f}) socket$inet(0x2, 0xa, 0x4) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) socket(0x0, 0x400000000000003, 0x0) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:35 executing program 0: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="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"], 0xfe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) mkdir(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, r0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:35 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x60000007, 0x2e0854ef, 0x0, 0x0, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf8", [[]]}, 0x20a) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) socket(0x0, 0x400000000000003, 0x0) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') socket$inet(0x2, 0x7, 0x20) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:35 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80d", [[]]}, 0x1f8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$apparmor_exec(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r1) 04:13:35 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0x0, 0x38, 0x0, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x223) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r1, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x6f, 0x1, {0x1, [{0x14, 0x2, 0x4}]}}, 0x16) write(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:35 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0x0, 0x38, 0x0, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x223) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r1, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x6f, 0x1, {0x1, [{0x14, 0x2, 0x4}]}}, 0x16) write(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:35 executing program 0: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000440)=ANY=[@ANYBLOB="7f454c4600080023060000000000000002003e0000000000b8000000380000002a0200000500000007000000ef54082efcffffff000000000000000009000000edffffff09000000c44da8835dbfc49065dcdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed9527fc1c6ab14270caa657bd4f82b3d833f05688e12ddc26842295399491c80da29aacb8ab8700000000000000000000000000000000000400000000d41041e63353e99ed13850430ee46b94044ff92346cdee2cb82ec7ada98e888aa3a72baa7d91338cc11f7ec600c2f88ae7fad4221acdd543a0f434c31ca89c18835c8189f816621cfd3b10f0df5f87f0a8"], 0xfe) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x42800, 0x4) ioctl$UI_END_FF_UPLOAD(r1, 0x406855c9, &(0x7f00000003c0)={0xe, 0x2c, {0x51, 0x624, 0x80, {0x8, 0x7585}, {0x1, 0x800}, @ramp={0x9, 0x10001, {0x1000000000, 0xff, 0xffffffff, 0x2}}}, {0x55, 0x40, 0x0, {0xd8cb, 0x4d}, {0x5, 0x401}, @rumble={0x6, 0x2}}}) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) mkdir(0x0, 0x0) write(r0, 0x0, 0xffffffffffffffae) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, r2) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='bpf\x00', 0x1000, &(0x7f0000000100)={[{@mode={'mode', 0x3d, 0xffff}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode'}}, {@mode={'mode', 0x3d, 0xe4c}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x4}}, {@mode={'mode', 0x3d, 0xc0}}, {@mode={'mode', 0x3d, 0x101}}], [{@obj_role={'obj_role', 0x3d, 'fd/3\x00'}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}]}) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:35 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0x0, 0x38, 0x0, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x223) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r1, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x6f, 0x1, {0x1, [{0x14, 0x2, 0x4}]}}, 0x16) write(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:35 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80d", [[]]}, 0x1f8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$apparmor_exec(r1, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) 04:13:35 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x60000007, 0x2e0854ef, 0x0, 0x0, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf8", [[]]}, 0x20a) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) socket(0x0, 0x400000000000003, 0xfffffffffffffffe) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:35 executing program 0: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x0, 0x0, 0x9, 0x0, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab87"}, 0xfe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x80, 0x0) write$P9_RMKDIR(r0, &(0x7f00000000c0)={0x14, 0x49, 0x1, {0x21, 0x0, 0x4}}, 0x14) mkdir(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, r1) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:38 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="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"/574], 0x243) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) mkdir(0x0, 0x1) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/mls\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r1) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:38 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80d", [[]]}, 0x1f8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$apparmor_exec(r1, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) 04:13:38 executing program 0: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x0, 0x0, 0x9, 0x0, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab87"}, 0xfe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x180) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)) mkdir(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, r1) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:38 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0x0, 0x38, 0x22a, 0x0, 0x7, 0x20, 0x2, 0x1ff, 0x2}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x223) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r1, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x6f, 0x1, {0x1, [{0x14, 0x2, 0x4}]}}, 0x16) write(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:38 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0x0, 0x38, 0x0, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x223) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r1, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x6f, 0x1, {0x1, [{0x14, 0x2, 0x4}]}}, 0x16) write(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:38 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x60000007, 0x2e0854ef, 0x0, 0x0, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf8", [[]]}, 0x20a) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) setsockopt$inet_int(r0, 0x0, 0x3b, &(0x7f00000000c0)=0x5, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) socket(0x0, 0x400000000000003, 0x0) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:38 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x0, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}, {0x60000007, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x243) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') r2 = fcntl$dupfd(0xffffffffffffffff, 0x406, r1) r3 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) poll(&(0x7f0000000140)=[{r3, 0x8}, {r2, 0x10}, {r2, 0x200}], 0x3, 0x340) read(r1, &(0x7f0000000180)=""/89, 0x59) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) poll(&(0x7f0000000100)=[{r3, 0x124}, {r0, 0x2000}, {r0}], 0x3, 0x40) 04:13:38 executing program 0: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/474], 0xfe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) mkdir(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@empty, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000180)=0xe8) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f00000001c0)={@rand_addr="fe1013b733c0dc09c89d4e886c8b93cd", r2}, 0x14) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:38 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x60000007, 0x2e0854ef, 0x0, 0x0, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf8", [[]]}, 0x20a) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x541000, 0x0) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) r2 = socket(0x0, 0x400000000000003, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_PORTS(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r3, 0x200, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x1) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:38 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x0, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}, {0x60000007, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x243) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r1) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000006740)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="711e3a2cae3ace609e585f96508e0e3838740b7a7a31687478225b2d2843701655df7784f359a75b6e646c2e4211eb441990ebd9a9f4b289ecf8cd38044dc5ec52ebd1872a70647d52dcc8be5502a9925eaa8ba79259b322f0fe8fc63f6d9200cb2f2ab23b5eef668347c6ad420ffa520f5dd7e491ca756a5234f47c54ec8e9842430aa0604e1933feafb777f64c483a9bb4f046b09e50aa2115fe8df963b0c64ae5adcb38628f9d4612ebce52b96448a2", 0xb1}, {&(0x7f00000001c0)="a064947171679cf747e708f9f0245a7b9b729481fe82be175dcbcf879b0e377a52285110133bab8a04ce108af5df0007f5f0480cc98c4f45603338ffc152bd09336b11e4fa63289fc845343872a00cc921eed60bf2d72ae196bab850", 0x5c}], 0x2}}, {{&(0x7f0000000500)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e22, @rand_addr=0x6}, 0x4, 0x0, 0x4, 0x2}}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000580)="8027fd10b4eedd7ccdf5322bd8743d59a003a9d00d81e6606f7e0c8d7df75961bbe1d0a1571c54081f9b88b72d6f3b0e787f32f55da1572d697ba0fbbcf97fefed90e94e7f82f74e65d600aa0778b84d9dd510d3f31df33f876966ad25f0e1fb97191fb4e5be19f5db6e98d110f183c2e764ad769ffac4d96fcf4ae8fa0b79751a80cdea13ab7c2be324c8c5b749c4fbe7a0b847c93addc78640231ef9dd4c8673a96031909d834a78bbca3a670053e79a8664ef1cc92a284e7e12c08895519294289835f5e0ceae43e41adde57eb9e37f5888095cfa5ce03144da9447f741c912a6ad86b6ad86087373ac27a164b75f13f233", 0xf3}, {&(0x7f0000000680)="477a9a4cca7cbc6e2c8a2c0ff525ef2ebcd88af66117a0110ae6a27acf05a8655ffbb6f9a36cfa391395b8375437de46ba5b6ce9f83df5f16f7cbce80a13116d71347fa48fe25f88de9f7ba6c244e1a1bae719422495ad46e578bd259436146bd4e320ec01710e84cb95155c2b127d867b9dca2efbc06148e1e08b5d588d47e58a491f8da9f7c17675cb8895a6bd70f10a21b15360155d645ead6a97d4b978acedc035838517dfea4773b25e97048f04d692b7ccf0c26fa3fe618400a3c3e157e869f844f42cca044665d369d91d54646cbeef", 0xd3}, {&(0x7f0000001140)="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", 0x1000}], 0x3, &(0x7f00000007c0)=[{0x110, 0x19d, 0x3, "e16daedfb03c083cbcd0470f7d4b8dacbaa6b38511b32fa167c5c52bd262027bea93d9063d42aa91db68d08612f6180deadbbcd3cd6ba2517e826c15a8a73ee7b43c6d2db8ebb504e196360a3a018c2ff10e9efd2a4631c4087e54ea07bb7088c9796804a2da76a53e674c0751c9cc7ee48a26a83cdf100415a532454fedebec36180d76e04df9c8af9bee32cd14f669572fd8dc08e281bc360b57eb188cc67afa89b29da993506ce6b39782baa79b2a1d3c6defd5a92a4c989730ec2bffde9c5cc0751550b742ba762011a2563b0e8505282a10fc8b85244929694efed676a2d9098f58d65128a354d132c57fc7afa8689a9d3f3dd77bc2dec4d6fc"}, {0x80, 0xbe, 0x1, "6f635559eaf4363698ef19eae1984cff734cbb431eda6119b2e21b88b95efe4f92bc5660b20b72eaae5b463a241f46d5407549994b9355b5682c7ab23797b58dac99b398f31b84525cbc3e0ea0fd4c2b232407b2eb995fa4a8d3c81024281e5a2ff1ef1ecae31a28b3e61355"}, {0x38, 0x117, 0xa000000000000, "01b881e521907a27fbdacee4c02efb8c92f6c1a39e34eff7968c4d7d0d2b2e071de8aa4d7155c5"}, {0x38, 0x1be, 0x100000001, "a2a5fdc5c05ba42a947360f3e84179304aaf9b0ca1ad703b5d1c7cbd356796653b"}], 0x200}}, {{&(0x7f00000009c0)=@nl=@unspec, 0x80, &(0x7f0000000c00)=[{&(0x7f0000000a40)="bafd0b06e4239aa85b8039aa12fd8ca061e6f50492a15cc9b751f3abc12a8bfcf43aa7e097cccea9aeb9a8d4e16a3b65d2933199b6b74c794e62c9fc430966e899bdec54bac6897354eaab68c46e7ed033cc21ad74d88eed2fbbed3ad7fa4d5278e3a14752d6c933eb9a9e4762c2fe4b1fbd862b8133ca6a1dbfdc0589e8f36c172f36270c5f4f864d21d757c0c1f4b71af12ce6961346c0199316f011112d57eb03795e0d2f56f87923db5bff3baa6dce298d5f782f63690887d07532dc22c900fca42b63e0053589", 0xc9}, {&(0x7f0000000b40)="f0368671d2b108e2dd8fcbaceb3c4a29e061332e702f0f293c69abc94e3aa5d15fb9d0c6b8b0e0d42daf4858257c5a9a761fd74c4f49d22bd0ee9414a98fda", 0x3f}, {&(0x7f0000000b80)="8a43b4d289d280dead4d4605148916f9b023231c8d902fafddc9b88cfb1df859c1bbe8203a867cf48d43bffe70ea8f588a4c0829ce401fbce0778a4bee4f218d32cf36979362f693cf", 0x49}], 0x3, &(0x7f0000000c40)=[{0x88, 0x10b, 0xffffffff, "2c2d6d9368fcb5bf234e03a90b5f9fc9f9e8f9e80bb7c618583513f4bcc4704db44bb60bdc78d6a3378af2914fd9ee7ad740ab2027ea7c18556926641794f15980e439d9ec30865bc7a27f592fc639aa083011d8690899ef4361e9aedfbc356d710905d4fc9957e4d5b59a5b49d336a81659"}, {0xc8, 0x10a, 0x8, "cc3195c4a2218031bb80ee67c724b1b62f54a3790f013907e862f9617251acd9415bfb2989173de6ab5527091698efed7dc122677ae291b7bb08ea6331359026274f24c4c547bcf8403756f8628f6a7fda12b1d255db8f79e79f488dcd21aed161b3b6c7a3285060ace126ec7406093d9065a55a89686eebd400ce0d56eccd429d7886913b2b9806d54ed198b9a1968bb72672b2a5297d2019549287b2b35df6e341d72e4877b290cec975f22beaeb66adab7410ea9b"}], 0x150}}, {{&(0x7f0000000dc0)=@ipx={0x4, 0x5, 0xffff, "c1eb14e49668", 0xfff}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)="d274b1e67ed8d4aa44c6ac05906c95a3cf583b2c07e40e01e7152f13869f8b30e60a5de48dc4fb05ebc167a823bdf638310a56e063994196699c6244", 0x3c}, {&(0x7f0000000e80)="b49721cc921bbeb2282b143c84f97189251563e89da4ce407a3a39b98a5e92919e0e5cde3149d217949419e1a2289c045a55f6ac3f70d403e7990904dff071b183062220988a27d3bf7aa8177b5d9ba316344a4659185385d18fa68e62ff20c9a5aafa2200fd38c450db6861533a6e33f748cd1a4959510bbe57141e5733de8130ac90ec4781bcddbd241be7d6507b5eb5793d11ae54439bd3977c603565720875227b5d21003e3314baa6cc67548774e60565d3dc17aef5d488da3d", 0xbc}], 0x2, &(0x7f0000000f80)=[{0xc8, 0x104, 0x1000, "5b2ab5614f0bf6cf3b7167a6a127d7544f264bce89558f8bda1001445f1922f5a4d9a0603beb413cc2833488c44fed963b9a5622fafea25959f4d3f8b80267fa8031539d5d69f68e835253eee26131815adb752f01a29bfe7e6c818de7302a281af6eff8d09b96720af636161f87b1f0dded184b3ff6b6f074648e661510bab3ca9ec88111f2e33f8710885faed88aeecf4c908b5fd5abfe9643a8cb6a005f12eba1b7ec175daf5000212b179528b2cd9d8bc8ce1c00"}], 0xc8}}, {{&(0x7f0000001080)=@ax25={{0x3, @bcast, 0x2}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default]}, 0x80, &(0x7f0000002200)=[{&(0x7f0000002140)="2b2c0bd79d18859e7c75f26d344b3328d98ec2682104a14a96074871a41f4c26f1bcf660bb0633e133047b37710060cf1a111334cf4d91b8b778af6eb6dccedc5a8bcd2c1024cef91959ff1dbb95275594453be65d5450022d2e4b80cfa118ea8bfc5201f48ba862f2c4b9c634e152fcb9f1bce9b63def5d2044da8d3bd36f543226993b6b3f6ad02bc28da5f82d5f6ce2c5a571f439aa73659ce81840582e7c8e840082a0d0ee83fa11247372578610d6417727c04654c728", 0xb9}], 0x1, &(0x7f0000002240)=[{0x1010, 0x1, 0x6208, "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"}, {0xd0, 0x114, 0xa40, "642063c38e532cb39d201a9d539bde3c0cbb7a6e25e38fecf59b1dca4647c33187d23676a43d068d3aed89840e9c5489047e9a989a29bb246f7834188f36c0dbf4f0932b22f8a577702eafe686435bb52278a46c684d0c6fc16c209c2f8ca92efea9d3d91cc9241d8584a6cd0c0edb696bc9436e16fc78d36da9a0c2b70612c34db4769230a8777ec420558e8e838774647915d4d0a8cbbc324a2e5d39fc9e16f3db3142370eefbc10a1ec545af7bdc709a5981e05920f9fa25543c998da"}], 0x10e0}}, {{0x0, 0x0, &(0x7f0000003400)=[{&(0x7f0000003340)="d259205a2820633f270626f8365432715f99efe0e32ab2d3a1e0281be624445703e08a8aab84d00f988daa85ca595d489757aa7254cff88af0d7236c9a5864f9b1940675e12b4452c820ad09d8e65dc4157b2d8a6f14d88032bedbd679cf", 0x5e}, {&(0x7f00000033c0)="eb67c0c1f937ee0542aa21f1f6ef7f067b8b7ca96eaaec960074d128a1aa2dd1f1bfe9ac0e85d78ed8a24bd8ad3c5ae87e7794fc308480bb4d1a17527d3067", 0x3f}], 0x2}}, {{&(0x7f0000003440)=@in={0x2, 0x4e22, @broadcast}, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)="b8e2111194c86ed1bb86523b87c9103116d0e58ff7227eb62edd1247ddf8b361ed2a1b848ed65100235f98fa3180cef753a10d6423bab9a0ebc2af62a82286a780cbd43d97e8916689475616b1b7b0f7b632475e0398e3960bfae846aaa26b938fd5383665f91ff0bf4273ec80f87a129af43ffbaf6e04ad3b45f0b0fdf5260dd76cdaf855dfaad98039903204d604407f873f42a572b7a79f07ee14bb542c949078dbc330bec6fdfe26ac0158c88eb600876e34c4b786a4e50928bcfe1a2b1adae17fdb52", 0xc5}, {&(0x7f00000035c0)="719c69b81650672c4c2610ceb5555cab61bc8279abbd113e7eaa81247f0b7de6c37397076c3c70cbae143215b516ced81c9a8a26d3ccec554bc74f754a0ff9cbe19a498582fce60a02be704cff1d4c7d6e0f1056b92162aa5bd2f554072c3a0deceeb907377124d65993a28cb23ebcd8447f14bb73d5ed37455f11cfd04457e82d95f1ae0c7bfca270a5e959c23eb59e7564b0c1e0f525c7f42e06b508a35a9b9d1ebd36fa20349c3b0654fd57ba88ad7446b7d76595cd4aba66b07146decb3eaad95be38c2e385d1cc628eb9a", 0xcd}, {&(0x7f00000036c0)="d03e0099d7", 0x5}, {&(0x7f0000003700)="d28f26e298e93c4f8299", 0xa}, {&(0x7f0000003740)="61b3feedb1d304e494fdee03241fe2568b3aed4ff068525f768b28840e250f", 0x1f}, {&(0x7f0000003780)="2efb656b2a6023d3d85b1c2134117398ff83f698649daedf4c8384281cd10fb6c3d38520634fc45d4607717d6feeca008647db9fa12a8d960097f77003f62a382c41b388106e82fdfe0d8cbb3a7b717bed858e3b19baa909e27ee3e138f8644f339c1abba1638d03c9e68f3a92b474cb0c54", 0x72}, {&(0x7f0000003800)="bc37bf78255f976739a33d259ac40f03fe55df2e002b44b61e7241b48582b67d21300f7124c79f378bf0263c98d9befed786598978b0659b2fae8121c7578ae2d3a9bbac0d0c41e857348d21ecc8cad42c007fb7005a3c040512d5b828f004c0d32ca8bd4c2754b1508895ab3c19ee2a7a7c8048496adfe5338bf442d326e738fe0385bc3077109fdbd09dd5e28feb18c06424c66e75bf22050650499ad6", 0x9e}], 0x7}}, {{&(0x7f0000003940)=@ax25={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @bcast]}, 0x80, &(0x7f0000003a80)=[{&(0x7f00000039c0)="473baf49502115c25c6db372d5387c80010eb5106358b1327c0abfb46f1e2145120dc08edbd5af4f6f9b7744d18be39dc714965cf16e17556a9e005c8cf509a3cdde1e3e3bade074c73d7e97a6ce2540792186e6deb58a0fdb12af856a3325f889ece9395912f821c1c949b0c6b2057d4373f5ceb59a6ead7d80351d5859ee9b820e8d2ec62a1294467831b79d0c5384dbb46ae33c218f81002b21c8b5be446bd281fe", 0xa3}], 0x1, &(0x7f0000003ac0)=[{0x58, 0x3a, 0xffff, "5d124ac6fe89ca1d21fde835a6765089da43cef6ced5171d6607a0d9056727304828233ef386b1f903e74e7635a81b583b920032f78ba2cfa0ca584b503d646c10c3c2f7033e"}, {0x30, 0x3a, 0x9, "85a7ada5d12713a4d8188f02b84524fb91f80fb32de51e03c5808c95c86172"}, {0xe0, 0x11d, 0x5, "94b29050417779eaeffea887ab8cbcab564523e220beacfafa9f4e64d8efc71d2e9caccd7652fe818eff0b267b38baed8570cfac8755c028116c4b8ba6d383b37b956c52393c74faa8dc10f72f4d85842b382ef303d1af0e895fa3502c60626d16bda821379cc92f91532ddc7bd6b2c46c12d860d9acdd09a073e008a65fc2890158fc690596900296f0f8b2e9d791a826bac1b73ac9148f6bf70dfaefe4c1357425cdb2e8639841a67c285e8fcdcca3cf878788ef87d30bf6e7ae33be0644d0a6abc3ca072006672c327643a329"}, {0xa8, 0x111, 0x1, "23acfc5cf4e7c3d6ae59ab5c9f95d7204da75cee42f77435433966cfb7e047b2316ada343d912c7099ff484c5fdc8fc8d4ffab482c4a52d49b02d9eb18d53af4f9fafd9997dae3b56bf83c69e3f7ead24ff5cdb84a88ab8e2b3ff308259c4fa2a3c167932eab902602f1d0ba3c662380c29ec8956687f3d19dda7e5ffacb4fcf572c8092a691560f0ed5f507992ea07da0b40eef2cbd"}, {0x30, 0x119, 0x2d9, "f96e5992925252815f93bbbe2a83bc1b56e42dbc27518556ef"}, {0x70, 0x118, 0x81, "2c38042a2f98ca2ad9a58b7b24021a8e62c14fc076915f6bb8116fd6c1856aaf230c623d596a0f2c8668ae5ee0cef98eeb16954b06b8a180b01a23909532244e60136d539fa7db811feec91d5add1c6a4cffe2859f6e8ca6f564c5"}, {0x1010, 0x104, 0x6, "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"}, {0x1010, 0x10a, 0x200, "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"}], 0x22d0}}, {{&(0x7f0000005dc0)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x4e20, @rand_addr=0x1}, 0x2, 0x2, 0x2, 0x1}}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005e40)="51511cd7079a62e2e94353f7043ed0ad777f04dae263c27f7f1abb39b7401cbf128afd972a4380eccd5479af059c895b", 0x30}, {&(0x7f0000005e80)="b8d3f29639e812be24d2706070a86cd52bbc8efb635843ce06455ea9c76660622bbda90a5fdb14f870f793367915fe3ff7382e0642b03524c13efb9e18b1c17d42003288c3c2c0e737fdbe93abd9d35aebde9ff380c20c856a8a43b6d328ce7dc138da", 0x63}, {&(0x7f0000005f00)="f9b30073e794eb7c1aa9b64b9d4c49cad30b028ac2cf33d6e85f8ec1f2a1b4bb2d2486fa750f871c990bd5b019ceb6a3b81e5fa32b3d957bd917c314f9", 0x3d}, {&(0x7f0000005f40)="066c852f5b8125ea8fb049c9c4feecc62cd00e371a8c6e1b53013574e93540683076bbc2a92783ce5122f18142f777bbe4d820d15d4b4b281421621b49e3b7c7710fd92d73a19536291798eac6f62a406716a34de377697e4e840d3ab3c7001f9ea97eaf60e29190511b33b694f12eb81eb64e44cffce5b89a8a5fe48252b5a8f566f25faebe566b6374dae27dc7d25ccde9f51d13187d366cf1783cd7f18265b0b90871182ca4555847b1d149c0f8ecf0bc7ce5b3230010bb529d256daba0cd5e6c4555465e8d2cb88f3310f1ae15109291d4f8db74fe3bb77b073174a7b26da8cb", 0xe2}, {&(0x7f0000006040)="7a50a841412011a94e032e1407ff46154646a0615793f3df6c148d11af4570e3b984a4a856461a1641bc7e8f4192ad98a207fc436aa982bd3c1d0330fe88ccfc", 0x40}, {&(0x7f0000006080)="cff274a3785d3441eb8a35c968b32e106d3d12f8f5cb837f6e209fe5c1810c24f24db3a1b95ce4ac4f3d0b7319d6f649c438108831adc4055ed24a5388471c56086d2d64528df0cbdfe8f98c3e6cb7472a39f2c2424618fccc767a9be3004e36d47291f947643bf8fced6b30305c36d66f3d573ea5fd46ec1707a0353ad22b", 0x7f}, {&(0x7f0000006100)="1bbbbdc4", 0x4}, {&(0x7f0000006140)="60bea5fa73f638b8101aa46883a90aaa158fec4624cc6de6e60e2b20d103e39c65b1a4fe0ec4ed8ee44cdd1a50892a080388672f5489fc7bafb43637b757e8916a099547592b1226844152996c10c3154b04bdd9c11f1afb4c3633e65f2e20127c3a8827b6e15322698e20a6527fb6328fb57a41841f22a5fab547cf0606f10f32894b9c2f08fbde5db366442c1961667185abd8f0cfc81c43ed2bc6ac6f3b9dcec3cb2357fce63cb562ade2473fea18d56d66f53fc185f90e01d4871d73f1d56c0a65dff76270573ee2179a93f521419baaa2b3c23a08691cba34b9ba01fc", 0xdf}], 0x8, &(0x7f00000062c0)=[{0xf0, 0x0, 0xfffffffffffffff8, "fe2bac08d61adfd2c69360ed07281d34cf3eae03bb5484aca451798c413fcf82bde35d805d0f1f878b044754ecc7af95963bc7c1f95a5fe92bdd67f845cb907ed57af94a8ec560635479286269c7caa4edad5713fe219c80ac8bf6edf3eb8c28ba1d08a19adb22c2ecaf8359d8568a139158017f9131b8e0dad1db6c9971a3de872d8d8c58d180e7b4e29ae2557a80cebc631147068890ee40bfd69ead2c2aee8273afbca9dbc9c5edd84a3cff6f5db4485b2d6965b79af11e90311fb036cd98da3981ebe33ea684a7fba43c82d078ef9fc5ce2cab830609fd3b05f0"}, {0x18, 0x107, 0x3f, "97f2763262cbe1"}, {0xf8, 0x88, 0x10000, "d3a8467c14b0003d39701c75d20959f3531bb10bd84637c1ab7bea144a33b5c80f5898fe9059caf9d59c814e0eddcbc9fa59e7baa5925c7388c24679e94d8c3fd32e8046af0af5ae93083e3b943d5f3861b1d9893f12f5b9ce76e6b6bef5bc992ae965b9a76cc8ebd9c55eb4335b6eabb4bffa08aea850e891fc68603fd596b8246794747cbe0dbd9c03170e7e77ddad48b7c27ac59274e16bc9f23efccf8eaba1707e2f3395d058e66c15d06eb7e5783c3a8653e364e2456a0419c63f2323f100ffcf7d5209c9c50b70786d22915c11398b7d56e31d2dc7fa4cfd256c655c66fb1d"}, {0x30, 0x107, 0x4, "e1ffa5ea61c4179631d679a9d6369fed558f163226888d303a5230223d0226"}, {0x50, 0x1ff, 0x4, "f66056d98fd013b8ba8d76abc450577a3f72764e09669ad217773eeaaa098bb3eed42e395197cad140255294ca5df01c9d10c6483c4b3b7a69c4f7aa68f48613"}, {0x30, 0x11, 0x0, "112066d74c009591bc50fa18f18ed7dc3b0699dd80b338e0ffbf2540"}, {0x70, 0x0, 0x7, "7880c7619bff79545c23125549845dfd726d68a2ba1440fd8e0b4368eedbb658b79e5f2408d304da46fad8827daffa6a366cee63706e292d71df0c1eff4e0b9ef4e8020fd27559d72508669a22c78b02a926036c2deca524eff9"}, {0x68, 0x84, 0x9, "1a3f01dd73884b72322f7f9cffe671140549ffbd8e2cd0d8e337c652dbb2436ec40fea2954ff73e76ee3bb999f09cb145c9357ca9f220140b495f064ba7d87c49e5bfb1612a08ca75a5345d76fd45e843cae7c"}, {0x58, 0x10e, 0x74, "924be14a609c1d7925460ef9334041c2037280e36f8eb85fec7aa6fe67c7dec78f6c6ebfa34cc5c0ad9cddbd9c50eb96334b5acba8931682e8a1d511a31a2b8e9004aa"}, {0xa0, 0x115, 0x8, "8a44c60c0734ca80bf036618c0e851c29892afcca0046ceeca3ca001fd3765c16c17ad5bf94ff239be82b2c3c35c420eaf9d92da9a182f6932dc1a2ff4b0fcb66cdeca7fbb343a0acd54e416233725de99802103b1b5e4af20e9826ea4102448c5a09e35ffbcb07f0ca61e1ccb199b956c6d9e568c418485107290b21e4d3ce0191ad66660c40eb9a7a608"}], 0x480}}], 0x9, 0x4000000) geteuid() signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:38 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0x0, 0x38, 0x22a, 0x0, 0x7, 0x20, 0x2, 0x1ff, 0x2}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x223) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r1, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x6f, 0x1, {0x1, [{0x14, 0x2, 0x4}]}}, 0x16) write(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:38 executing program 0: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x0, 0x0, 0x9, 0x0, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab87"}, 0xfe) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) close(r0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) mkdir(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, r1) unshare(0x40000) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:38 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0x0, 0x38, 0x0, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x223) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r1, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x6f, 0x1, {0x1, [{0x14, 0x2, 0x4}]}}, 0x16) write(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:38 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80d", [[]]}, 0x1f8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$apparmor_exec(r1, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) 04:13:38 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0xfe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'broute\x00'}, &(0x7f0000000280)=0x78) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) mkdir(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, r1) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:38 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0x0, 0x38, 0x22a, 0x0, 0x7, 0x20, 0x2, 0x1ff, 0x2}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x223) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r1, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x6f, 0x1, {0x1, [{0x14, 0x2, 0x4}]}}, 0x16) write(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:38 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0x0, 0x38, 0x22a, 0x0, 0x7, 0x20, 0x2, 0x1ff, 0x2}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x223) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r1, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x6f, 0x1, {0x1, [{0x14, 0x2, 0x4}]}}, 0x16) write(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:38 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x60000007, 0x2e0854ef, 0x0, 0x0, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf8", [[]]}, 0x20a) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) socket(0x0, 0x400000000000003, 0x0) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:38 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x0, 0x0, 0x9, 0x0, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab87"}, 0xfe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) ioctl$BLKIOMIN(r0, 0x1278, &(0x7f0000000080)) mkdir(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, r0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:38 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0x0, 0x38, 0x22a, 0x5, 0x0, 0x20, 0x2, 0x1ff, 0x2}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x223) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r1, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x6f, 0x1, {0x1, [{0x14, 0x2, 0x4}]}}, 0x16) write(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:39 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80d", [[]]}, 0x1f8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$apparmor_exec(r1, &(0x7f00000002c0)=ANY=[], 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, r2) 04:13:39 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x0, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}, {0x60000007, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x243) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') setsockopt$IP_VS_SO_SET_ADDDEST(r1, 0x0, 0x487, &(0x7f0000000100)={{0x67, @multicast1, 0x4e22, 0x2, 'lblcr\x00', 0x14, 0x5, 0x23}, {@multicast2, 0x4e20, 0x10000, 0x80000000, 0x5, 0x80}}, 0x44) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:39 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x60000007, 0x2e0854ef, 0x0, 0x0, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf8", [[]]}, 0x20a) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x541000, 0x0) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) r2 = socket(0x0, 0x400000000000003, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_PORTS(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r3, 0x200, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x1) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:39 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0x0, 0x38, 0x22a, 0x5, 0x0, 0x20, 0x2, 0x1ff, 0x2}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x223) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r1, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x6f, 0x1, {0x1, [{0x14, 0x2, 0x4}]}}, 0x16) write(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:39 executing program 0: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x0, 0x0, 0x9, 0x0, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab87"}, 0xfe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x82000, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f00000000c0)={0x2, 0x0, 0x3, 0x4080000000, 0x400, 0x8000}) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) mkdir(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, r1) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:39 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80d", [[]]}, 0x1f8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$apparmor_exec(r1, &(0x7f00000002c0)=ANY=[], 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, r2) 04:13:39 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x60000007, 0x2e0854ef, 0x0, 0x0, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf8", [[]]}, 0x20a) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) socket(0x0, 0x400000000000003, 0x0) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') read$FUSE(r1, &(0x7f00000004c0), 0x1000) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:39 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x0, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}, {0x60000007, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x243) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) r1 = socket(0xa, 0x806, 0x80) getsockopt$inet_tcp_int(r1, 0x6, 0x12, &(0x7f0000000100), &(0x7f0000000140)=0x4) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:39 executing program 0: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x0, 0x0, 0x9, 0x0, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab87"}, 0xfe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) mkdir(0x0, 0x0) r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) ioctl$UI_SET_SWBIT(r0, 0x4004556d, 0x9) write(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, r1) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:39 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x60000007, 0x2e0854ef, 0x0, 0x0, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf8", [[]]}, 0x20a) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) socket(0x0, 0x400000000000003, 0x0) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:39 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x243) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r1) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:39 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x60000007, 0x2e0854ef, 0x0, 0x0, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf8", [[]]}, 0x20a) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x38, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/packet\x00') bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80210600, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) fsetxattr$security_smack_transmute(r3, &(0x7f00000000c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000100)='TRUE', 0x4, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}}}, &(0x7f0000000180)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@loopback, @in=@empty, 0x4e22, 0x0, 0x4e24, 0x7, 0x2, 0x0, 0x20, 0x6c, 0x0, r4}, {0x8, 0x4, 0x9, 0x5, 0x3ff, 0xfffffffffffffff7, 0x80000001, 0xffffffff}, {0x8, 0x101, 0x6, 0x4}, 0xff, 0x6e6bba, 0x1, 0x0, 0x3}, {{@in=@multicast1, 0x4d6, 0x3c}, 0xa, @in=@local, 0x3503, 0x0, 0x0, 0x1, 0x8, 0x80000001, 0x9}}, 0xe8) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) socket(0x0, 0x400000000000003, 0x0) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:39 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x0, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}, {0x60000007, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x243) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockopt$inet_opts(r1, 0x0, 0xd, &(0x7f0000000140)=""/144, &(0x7f0000000200)=0x90) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:39 executing program 0: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x0, 0x0, 0x9, 0x0, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab87"}, 0xfe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) mkdir(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, r0) openat$full(0xffffffffffffff9c, 0x0, 0x10100, 0x0) 04:13:39 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x0, 0x0, 0x9, 0x0, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab87"}, 0xfe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) ioctl$BLKIOMIN(r0, 0x1278, &(0x7f0000000080)) mkdir(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, r0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:39 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0x0, 0x38, 0x22a, 0x5, 0x0, 0x20, 0x2, 0x1ff, 0x2}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x223) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r1, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x6f, 0x1, {0x1, [{0x14, 0x2, 0x4}]}}, 0x16) write(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:39 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80d", [[]]}, 0x1f8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$apparmor_exec(r1, &(0x7f00000002c0)=ANY=[], 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, r2) 04:13:39 executing program 0: syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x4c0000) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0xfe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) epoll_create1(0x80000) mkdir(0x0, 0x3) r0 = socket(0x3, 0x800, 0x1) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000900)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000a00)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000009c0)={&(0x7f0000000940)=ANY=[@ANYBLOB="5f101055", @ANYRES16=r1, @ANYBLOB="00032cbd7000fbdbdf250300000008000100000000000c00040009000000000000000c00050020000000000000000c00030008000000000000000c000300010000000000000008000100000000000c0004000100000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x4008800}, 0x1) write(0xffffffffffffffff, 0x0, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x10000, 0x10) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000340)={0x7, 0xfffffffffffffff8}) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') ioctl$EVIOCGVERSION(r3, 0x80044501, &(0x7f00000002c0)=""/90) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) listxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=""/231, 0xe7) ioctl$sock_inet6_SIOCSIFDSTADDR(r3, 0x8918, &(0x7f00000000c0)={@rand_addr="8c9461aa9a73b1a6e36c5f9a8487f978", 0x79, r4}) fcntl$dupfd(0xffffffffffffffff, 0x0, r3) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000004c0)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000480)="14d4573d28bb18c324922638712904a6d3ffda2d25746fbcdb45742d3a94cb2397f5277067a946ec35fb17ed9de3b9b142d0", 0x32, r0}, 0x68) 04:13:39 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x0, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}, {0x60000007, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x243) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) mkdir(0x0, 0x1f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') r2 = fcntl$dupfd(0xffffffffffffffff, 0x406, r1) ioctl$TIOCSRS485(r2, 0x542f, &(0x7f0000000180)={0x0, 0x80000000000, 0x1}) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r2, 0x29, 0x44, &(0x7f0000000100)={'NETMAP\x00'}, &(0x7f0000000140)=0x1e) signalfd4(r2, 0x0, 0x0, 0x0) execveat(r1, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000200)='nodev(vmnet1\x00', &(0x7f0000000240)='NETMAP\x00', &(0x7f0000000500)='fd/3\x00', &(0x7f0000000540)='/dev/loop#\x00', &(0x7f0000000580)='/dev/loop#\x00', &(0x7f00000005c0)='fd/3\x00', &(0x7f0000000600)='fd/3\x00', &(0x7f0000000640)='NETMAP\x00'], &(0x7f0000000700)=[&(0x7f00000006c0)='/dev/loop#\x00'], 0x800) 04:13:39 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0x0, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x223) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r1, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x6f, 0x1, {0x1, [{0x14, 0x2, 0x4}]}}, 0x16) write(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:39 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0x0, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x0, 0x1ff, 0x2}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x223) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r1, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x6f, 0x1, {0x1, [{0x14, 0x2, 0x4}]}}, 0x16) write(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:39 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80d", [[]]}, 0x1f8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$apparmor_exec(r1, &(0x7f00000002c0)=ANY=[], 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, r2) 04:13:39 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x60000007, 0x2e0854ef, 0x0, 0x0, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf8", [[]]}, 0x20a) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) socket(0x0, 0x400000000000003, 0x0) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vlan0\x00', 0x4102}) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:39 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x0, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}, {0x60000007, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x243) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r1) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:39 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80d", [[]]}, 0x1f8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$apparmor_exec(r1, &(0x7f00000002c0)=ANY=[], 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, r2) 04:13:39 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x0, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}, {0x60000007, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x243) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) socketpair(0x8, 0x7, 0x9, &(0x7f0000000100)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, 0x0, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:39 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x60000007, 0x2e0854ef, 0x0, 0x0, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf8", [[]]}, 0x20a) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x38, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/packet\x00') bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80210600, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) fsetxattr$security_smack_transmute(r3, &(0x7f00000000c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000100)='TRUE', 0x4, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}}}, &(0x7f0000000180)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@loopback, @in=@empty, 0x4e22, 0x0, 0x4e24, 0x7, 0x2, 0x0, 0x20, 0x6c, 0x0, r4}, {0x8, 0x4, 0x9, 0x5, 0x3ff, 0xfffffffffffffff7, 0x80000001, 0xffffffff}, {0x8, 0x101, 0x6, 0x4}, 0xff, 0x6e6bba, 0x1, 0x0, 0x3}, {{@in=@multicast1, 0x4d6, 0x3c}, 0xa, @in=@local, 0x3503, 0x0, 0x0, 0x1, 0x8, 0x80000001, 0x9}}, 0xe8) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) socket(0x0, 0x400000000000003, 0x0) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:39 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="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"/522], 0x20a) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) socket(0x0, 0x400000000000003, 0x0) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:39 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0x0, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x0, 0x1ff, 0x2}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x223) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r1, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x6f, 0x1, {0x1, [{0x14, 0x2, 0x4}]}}, 0x16) write(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:39 executing program 0: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c4600080023060000000000000002003e0000000000b8000000380000002a02000005000000070020000200ff01020000f00000000000000000ef54082efcffffff0000000000000000090000000000000009000000a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295393576259491c80da29aacb8ab874d36c65b8429fb001d763ae23fee057674b45ad880787fd2daae39089a0b7369fcd362d1ef0cf4871287ca744873cd6681ebdf7df7121d459645570048eeb547798dbdb2b3d963aab230f2c5456902be303f464ae2ec29d2bb76d817b02286fdb693bc7a9ca7ce7c8d2add01a50acfce746885841e358990d4fd38abfcba9b5c968bbd095ff437a15c106faabde6d522117f3e4d40d5dbc4d5892c6018f16cff4e3229219fb2c7ed55ab61dd8ebb1b70ebb317da92a3af4e5dfe5d7d74032b03656ff7134eb7a9549a9ff35eeddc07b75402445c6fefec67d59408d9342f7ab0f484895676b074f7170b5089d09a4febfac5cd769ca3cb"], 0xfe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x20001, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r1, &(0x7f00000004c0)={0x2, 0x4e24, @rand_addr=0x8}, 0x10) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vga_arbiter\x00', 0x400000, 0x0) ioctl$TIOCSISO7816(r3, 0xc0285443, &(0x7f0000000580)={0x80000000, 0x4, 0x2a8b, 0x800, 0xa3cf}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000001c0)) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0xfffffffffffffffe, @dev={0xac, 0x14, 0x14, 0x17}}, {0x2, 0x4e22, @remote}, {0x2, 0x4e20, @broadcast}, 0x0, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x1000, 0x800000000, 0xffffffffffffffff}) r4 = accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000003440)) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r4, &(0x7f0000000440)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000340)={&(0x7f00000003c0)=ANY=[@ANYBLOB="100025bd7000fedbdf250b0000000c00030008000500ac14141f0800040000000000080004000500000014000100080001000000000008000800040000002c000300080008000100000008000100030000000800010001000000080008"], 0x1}, 0x1, 0x0, 0x0, 0x24008805}, 0x10) r5 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x82) ioctl$RTC_AIE_ON(r5, 0x7001) prctl$PR_CAPBSET_READ(0x17, 0x19) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @loopback}, 0x10) rename(&(0x7f0000002300)='./file0\x00', &(0x7f0000000300)='./file0\x00') ppoll(&(0x7f0000000140)=[{r0, 0x2074}], 0x1, &(0x7f0000000240)={0x77359400}, &(0x7f00000002c0)={0xfff}, 0x8) unshare(0x60000000) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) ioctl$RTC_RD_TIME(r5, 0x80247009, &(0x7f0000000380)) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) epoll_create1(0x0) 04:13:39 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="7f454c4600089c23060000000000000002003e0007000000b8000000380000002a02000005000000070020000200ff01020000f00000000007000060ef54082e00000000000000000100010009000000050000000900ce5aa3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf800000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800"/522], 0x20a) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x406, r0) r3 = getuid() lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(r2, &(0x7f00000000c0)='./file0\x00', r3, r4, 0x1400) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) socket(0x0, 0x400000000000003, 0x0) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:40 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x60000007, 0x2e0854ef, 0x0, 0x0, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf8", [[]]}, 0x20a) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) socket(0x0, 0x400000000000003, 0x0) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:40 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0x0, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x0, 0x1ff, 0x2}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x223) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r1, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x6f, 0x1, {0x1, [{0x14, 0x2, 0x4}]}}, 0x16) write(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:40 executing program 4: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x0, 0x0, 0x9, 0x0, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab87"}, 0xfe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) mkdir(0x0, 0x0) r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) setsockopt$inet6_tcp_buf(r0, 0x6, 0xb, &(0x7f00000000c0)='x', 0x1) write(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, r1) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:40 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0x0, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x0, 0x2}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x223) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r1, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x6f, 0x1, {0x1, [{0x14, 0x2, 0x4}]}}, 0x16) write(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:40 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/525], 0x20a) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) fadvise64(r1, 0x0, 0x5, 0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0}, 0x0) fcntl$setown(r1, 0x8, r2) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) setitimer(0x2, &(0x7f0000000180)={{}, {r4, r5/1000+10000}}, &(0x7f00000001c0)) socket(0x0, 0x400000000000003, 0x0) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) fcntl$getown(r3, 0x9) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') r6 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$F_SET_FILE_RW_HINT(r6, 0x40e, &(0x7f00000000c0)=0x5) 04:13:40 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80d", [[]]}, 0x1f8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$apparmor_exec(r1, &(0x7f00000002c0)=ANY=[], 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, r2) 04:13:40 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x0, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}, {0x60000007, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x243) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$FIGETBSZ(r1, 0x2, &(0x7f0000000100)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:40 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x20a) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) r1 = accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @remote}, &(0x7f0000000280)=0x10) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000002c0), 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) socket(0x0, 0x400000000000003, 0x0) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:40 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80d", [[]]}, 0x1f8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$apparmor_exec(r1, &(0x7f00000002c0)=ANY=[], 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) 04:13:40 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/525], 0x20a) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) fadvise64(r1, 0x0, 0x5, 0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0}, 0x0) fcntl$setown(r1, 0x8, r2) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) setitimer(0x2, &(0x7f0000000180)={{}, {r4, r5/1000+10000}}, &(0x7f00000001c0)) socket(0x0, 0x400000000000003, 0x0) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) fcntl$getown(r3, 0x9) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') r6 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$F_SET_FILE_RW_HINT(r6, 0x40e, &(0x7f00000000c0)=0x5) [ 295.197760] audit: type=1400 audit(1560831220.817:26): avc: denied { ioctl } for pid=23567 comm="syz-executor.0" path="socket:[77375]" dev="sockfs" ino=77375 ioctlcmd=0x7001 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 04:13:40 executing program 0: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x0, 0x0, 0x9, 0x0, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab87"}, 0xfe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000380)='/dev/null\x00', 0x10200, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f00000003c0)=0x4) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x250000, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, &(0x7f0000000180)={'nat\x00', 0x0, 0x3, 0x7e, [], 0x2, &(0x7f00000000c0)=[{}, {}], &(0x7f0000000100)=""/126}, &(0x7f0000000200)=0x78) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) mkdir(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:40 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0x0, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x0, 0x2}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x223) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r1, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x6f, 0x1, {0x1, [{0x14, 0x2, 0x4}]}}, 0x16) write(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:40 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80d", [[]]}, 0x1f8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$apparmor_exec(r1, &(0x7f00000002c0)=ANY=[], 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) 04:13:40 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x20a) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) r1 = accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @remote}, &(0x7f0000000280)=0x10) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000002c0), 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) socket(0x0, 0x400000000000003, 0x0) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:40 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="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"/579], 0x243) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(r0, 0x406, r2) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r1) r3 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents(r3, &(0x7f0000000100)=""/219, 0xdb) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:40 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x210000) write$binfmt_elf32(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="7f454c4600089c23060000000000000002003e0007000000b8000000380000002a02000005000000070020000200ff01020000f00000000007000060ef54082e000000000000000001000100090000000500000009000000a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e8649df5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf80000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000077a752e0300c71666864408ae962813e5a8c39fe9c04144368eddcba86e53b8b9a8f23161151d36acbfd880aae4a98e4c5e2e46fa5de7f534d6ba06a"], 0x20a) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) socket(0x0, 0x400000000000003, 0x0) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') openat$full(0xffffffffffffff9c, 0x0, 0x40, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:41 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x0, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}, {0x60000007, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x243) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff}) getsockopt$bt_hci(r1, 0x0, 0x3, &(0x7f0000000140)=""/178, &(0x7f0000000200)=0xb2) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:41 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], 0x20a) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) socket(0x0, 0x400000000000003, 0x0) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:41 executing program 0: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x0, 0x0, 0x9, 0x0, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab87"}, 0xfe) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f00000024c0)) mkdir(0x0, 0x0) write(r0, 0x0, 0x37b31391cbacc52d) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:41 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x20a) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) r1 = accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @remote}, &(0x7f0000000280)=0x10) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000002c0), 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) socket(0x0, 0x400000000000003, 0x0) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:41 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="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"/579], 0x243) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(r2, 0x406, r1) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:41 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/588], 0x243) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x0, 0x0) r3 = getpgid(0xffffffffffffffff) getresuid(&(0x7f00000003c0), &(0x7f0000000400)=0x0, &(0x7f0000000440)) getgroups(0x1, &(0x7f0000000480)=[0xee01]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0)={0x0}, &(0x7f0000000780)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in6=@remote, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@initdev}}, &(0x7f00000008c0)=0xe8) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000009c0)=0x0) getresuid(&(0x7f0000000a00), &(0x7f0000000a40)=0x0, &(0x7f0000000a80)) r11 = getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000ac0)=0x0) r13 = geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000b00)={0x0, 0x0, 0x0}, &(0x7f0000000b40)=0xc) sendmsg$unix(r2, &(0x7f0000000c80)={&(0x7f0000000140)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000380)=[{&(0x7f0000001140)="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", 0x1000}, {&(0x7f00000001c0)="0f67391fcd51acc1ebf0b8f90e4c391b1caaf797db", 0x15}, {&(0x7f0000000200)="4d4143d588052a282371b4fddc7d22848cce31daf6a085772e4a3e8bbe15f84ce7c2a30f489e6d2e32d700591e499e8128c33f761e03ef7d270d83ec56303f4fae71bf796905272693e3086f6a545cbad20a58e0f09babb399c32177625963ad14b0afb42e84af90a7a5a58c515def533eac74d95c8ce3f62c5b74c048f5fbec08a9dde19e3ed6c689a56ab0b71c0bf8f65a3380095ba99a9999b3a3141b9f33099e841306450157a851f5cad485585c773d293b737906a36a6143dbfe62d1ed6e4e8b72", 0xc4}, {&(0x7f0000000300)="b14d7a6ed845ffaad2b640eea5009b104cfdcc9fbac5d2c9b4d89f760968b45767aea88414f75cdf0b49f4337878fbc5d8490cdae127034ca07a96ccf8aceb6570ca85e95f61d53ab0c84baa", 0x4c}], 0x4, &(0x7f0000000b80)=[@cred={{0x1c, 0x1, 0x2, {r3, r4, r5}}}, @rights={{0x24, 0x1, 0x1, [r0, r1, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r6, r7, r8}}}, @rights={{0x28, 0x1, 0x1, [r1, r1, r1, r0, r0, r1]}}, @rights={{0x18, 0x1, 0x1, [r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r9, r10, r11}}}, @cred={{0x1c, 0x1, 0x2, {r12, r13, r14}}}], 0xe8, 0x4001}, 0x800) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) fsetxattr$security_capability(r2, &(0x7f0000000cc0)='security.capability\x00', &(0x7f0000000d00)=@v1={0x1000000, [{0xff, 0x3}]}, 0xc, 0x1) r15 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r15) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:41 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80d", [[]]}, 0x1f8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$apparmor_exec(r1, &(0x7f00000002c0)=ANY=[], 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) 04:13:41 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0x0, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x0, 0x2}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x223) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r1, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x6f, 0x1, {0x1, [{0x14, 0x2, 0x4}]}}, 0x16) write(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:41 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x60000007, 0x2e0854ef, 0x0, 0x0, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf8", [[]]}, 0x20a) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) socket(0x0, 0x400000000000003, 0x0) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r1) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:41 executing program 0: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x0, 0x0, 0x9, 0x0, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab87"}, 0xfe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) mkdir(0x0, 0x2) write(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, r0) openat$full(0xffffffffffffff9c, 0x0, 0xfffffffffffffffd, 0x0) 04:13:41 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x20a) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) r1 = accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @remote}, &(0x7f0000000280)=0x10) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000002c0), 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) socket(0x0, 0x400000000000003, 0x0) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:41 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)) write$binfmt_elf32(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="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"/579], 0x243) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r1) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(r0, 0x0, 0x97b2e5dc, 0x180800) 04:13:41 executing program 1: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x0, 0x0, 0x9, 0x0, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab87"}, 0xfe) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f00000024c0)) mkdir(0x0, 0x0) write(r0, 0x0, 0x37b31391cbacc52d) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:41 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0x0, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x223) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r1, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x6f, 0x1, {0x1, [{0x14, 0x2, 0x4}]}}, 0x16) write(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:41 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x0, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}, {0x60000007, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x243) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x41, 0x0) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r1) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:41 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f00000004c0)=ANY=[@ANYBLOB="7f454c4600089c23060000000000000002003e0007000000b8000000380000002a02000005000000070020000200ff01020000f00000000007000060ef54082e000000000000000001000100090000000500000009000000a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c855aac4637619bac37051c0ac53efac4aa1abf8000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d36dd6db858c6375e461ca00"/533], 0x20a) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) socket(0x0, 0x400000000000003, 0x0) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:41 executing program 0: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0xfe) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@loopback, @in6=@ipv4={[], [], @initdev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000001c0)=0xe8) r2 = add_key(&(0x7f0000000000)='trusted\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000400)="4ad156d3e034926cb98b2de503524c03151a334981a389fa6b061e2a3c0562b0052680b206ac00b0dfc4a9a7cb95cdea16cb4f0cf7708b10b8afa9b8970596cd9f1a0249bff7482a21a6bbe8da97200ae9928eecaabf655e4b52cbeaa4b30be4557c86850887cd8b145862e85cead9052ba43423657cd7334a23175f6c56ccb9cdf8fc33f0d9c8fb52fcfc74d3feed672d89024cb26aa9b2c4c17747", 0x9c, 0xfffffffffffffffd) r3 = add_key(&(0x7f00000004c0)='user\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)="e0d14f9ef9c5ed276bff9dc2b16e68086c645fc4ec8695195b734edad21830202e95226e2852981e0006c4d9", 0x2c, 0xfffffffffffffffb) keyctl$reject(0x13, r2, 0x8, 0xba, r3) connect$packet(r0, &(0x7f0000000200)={0x11, 0x4, r1, 0x1, 0x7}, 0x14) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) mkdir(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000380)='\x00\x00\x00\x00\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, r4) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:41 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0x0, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x0, 0x2}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x223) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r1, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x6f, 0x1, {0x1, [{0x14, 0x2, 0x4}]}}, 0x16) write(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:41 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80d", [[]]}, 0x1f8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$apparmor_exec(r1, &(0x7f00000002c0)=ANY=[], 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) 04:13:41 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0x0, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x223) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r1, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x6f, 0x1, {0x1, [{0x14, 0x2, 0x4}]}}, 0x16) write(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:41 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="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"/579], 0x243) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r1) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x8, 0x103000) ioctl$RTC_WKALM_RD(r1, 0x80287010, &(0x7f0000000140)) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:41 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x60000007, 0x2e0854ef, 0x0, 0x0, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf8", [[]]}, 0x20a) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) perf_event_open(&(0x7f00000000c0)={0x3, 0x70, 0x6, 0x4, 0x2, 0x787, 0x0, 0x2, 0x4, 0x1, 0x2, 0x4, 0x4, 0x0, 0x400, 0xfffffffffffffffd, 0x6, 0x39f, 0x8, 0x7fffffff, 0x3e7, 0x0, 0x7ff, 0x738c, 0x800, 0x45, 0x9, 0xfff, 0x1ff, 0x1, 0x200, 0x20, 0x1f, 0x7f, 0x728f, 0xffffffffffffffff, 0xd20, 0x8, 0x0, 0xa5f, 0x4, @perf_config_ext={0x7, 0x7}, 0x100, 0x0, 0x7ff, 0x0, 0x5, 0x8, 0x5f47}, r2, 0xf, r1, 0x3) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/checkreqprot\x00', 0x2, 0x0) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000200)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r3, &(0x7f0000000540)={&(0x7f00000001c0), 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, r4, 0x820, 0x70bd2d, 0x25dfdbfe, {}, [@NBD_ATTR_SIZE_BYTES={0xc}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x50}, 0x20040004) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) socket(0x0, 0x400000000000003, 0x0) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:41 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x0, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}, {0x60000007, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x243) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) socketpair(0x8, 0x7, 0x9, &(0x7f0000000100)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, 0x0, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:41 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80d", [[]]}, 0x1f8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$apparmor_exec(r1, &(0x7f00000002c0)=ANY=[], 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) 04:13:41 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4600009c23060000000000000002003e0007000000b8000003000000002a02000005000000000020000200ff01020000f00000000004000000000000000400000000000080af34000080000000ff000000ffffffff07000060ef54082efcffffff0900000001000100090000000500000009000000a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c5e925778ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001a4bf727000000000000000000000000000000000000c0745bbf03f438d59402db383cef01867d3b4f795441d1f7ad2568b6dab2d090a5b9f6915144a01794abd83a87a9fcba3dc21c93fabd81b9d1df07df4b77548e061a5f83b7c169d3293312e0e348fa9b6a41fd8c27be7aafc3a50aeff731098ee67fdef2801b19db2b077abd2bee2caa3fff8d66c02f6919d368f5515f0b"], 0x243) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r1) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:41 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0x0, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x223) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r1, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x6f, 0x1, {0x1, [{0x14, 0x2, 0x4}]}}, 0x16) write(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:41 executing program 0: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="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"], 0xfe) r0 = gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) mkdir(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, r1) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:41 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x0, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}, {0x60000007, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x243) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) socketpair(0x8, 0x7, 0x9, &(0x7f0000000100)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, 0x0, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:41 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c4600009c23060000000000000002003e0007000000b8000000380000000200ff01020000f00000000004000000000000000400000000000080af34000080000000ff000000ffffffff07000060ef54082efcffffff0900000001000100090000000500000009000000a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000ffffffff000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a0f63401ab64e3cfb440f35de65110bb6922ed2704d72bcbfc71cb961b402fdd88d18d5b9cb62bdd8149836dcce32c3e54e2f513e8fd3d0b3d9e6023b5ae7f51a70a3ba2c8f47f53a91b81f151199a42f79d8c34488f573194f1297c955283eee88c6f1cb1cb7e4b21734002fcdc5933f3bd9ab1c04db2e416a6433ff1b20bc17c4cd8cd0be363fbf3cc591d"], 0x243) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:42 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0x0, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2}, [{0x0, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x223) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r1, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x6f, 0x1, {0x1, [{0x14, 0x2, 0x4}]}}, 0x16) write(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:42 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f00000004c0)=ANY=[@ANYBLOB="7f454c4600089c23060000000000000002003e0007000000b8000000380000002a02000005000000070020000200ff01020000f00000000007000060ef54082e000000000000000001000100090000000500000009000000a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf80000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003490b436bf00"/527], 0x20a) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f00000003c0)=0xe8) sendmsg$FOU_CMD_GET(r1, &(0x7f0000000700)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x54, r2, 0x200, 0x70bd27, 0x25dfdbfd, {}, [@FOU_ATTR_TYPE={0x8, 0x4, 0x2}, @FOU_ATTR_IFINDEX={0x8, 0xb, r3}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e24}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @remote}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e22}, @FOU_ATTR_PEER_V6={0x14, 0x9, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4000004}, 0x8000) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/policy\x00', 0x0, 0x0) r4 = dup3(r0, r0, 0x80000) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) ioctl$TIOCOUTQ(r4, 0x5411, &(0x7f0000000180)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) socket(0x0, 0x400000000000003, 0x0) ioctl$KDENABIO(r5, 0x4b36) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:42 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x8000000000002, 0x200000) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x0, 0x0, 0x9, 0x0, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab87"}, 0xfe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) mkdir(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, r1) dup3(r0, r0, 0x80000) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:42 executing program 4: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000000c0)) openat$full(0xffffffffffffff9c, 0x0, 0x2c001, 0x0) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) write$apparmor_exec(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') 04:13:42 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0x0, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2}, [{0x0, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x223) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r1, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x6f, 0x1, {0x1, [{0x14, 0x2, 0x4}]}}, 0x16) write(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:42 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000580)=ANY=[@ANYBLOB="7f454c4600ff0f23060000000000000002003e0007000000b8000000380000002a02000005000000000020000200ff01020000f00000000004000000000000000400000000000080af34000080000000ff000000ffffffff07000060ef54082efcffffff0900000001000100090000000500000009000000a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2137bbf967ba592d7c23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26064c8aabc100842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000abe90cc6c53cfa4c6c5cda2d0d67f2127172061a1e907bdc9a35f9bd8618ec51b80a462828137524bb4c145f4c61c9da59adec9272b73f88be77e1046a0e2535f9218bc0994fce812ea5544d1ba27cb1e7309a792cce1a8d5dcb700bd7920a20a1398ffea84ecc5165abaf7f7f28ed7f4633e467717fab814ab439c4022c1946755694fc10d4f46a1345205fe0e0b444bd5eeecfe07942f1ba2168519e449c"], 0x243) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x100000000, r1) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:42 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x223) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r1, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x6f, 0x1, {0x1, [{0x14, 0x2, 0x4}]}}, 0x16) write(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:42 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0x0, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2}, [{0x0, 0x0, 0x0, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x223) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r1, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x6f, 0x1, {0x1, [{0x14, 0x2, 0x4}]}}, 0x16) write(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:42 executing program 0: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x0, 0x0, 0x9, 0x0, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab87"}, 0xfe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) mkdir(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, r0) clone(0x0, &(0x7f0000000080)="c1739f6aa9a21763f8a7810c7beb9675a859e6cdfebacdc5de3580df916941c9c5c2ffdd9abe67ddb5aa4bfdc6c2c3cb86b8bebffc2cd2e5e3e99c4d071d5790f8eff8bc1616b6b46b815086f884e164471226949c2badf6f8d12b33217ba5118af92cf53acfe10cb73e4bbc568224c5975830bd466ade6eea69a8a4137d1c633581511b73b2affeda7eb5ea2b0dc7f30c0925761eac2010ab039d79fc61bd8be7a88f4ba48ae2096507966ba8a45a54810fc71a9d4172a50a46ffdbafbc470aaebf9f1417dee380d8a6ff86cf1b22683c00a15784c6532aa8b5c54e1e56d3c4755b83041f10974cc956e3e1a24ef0716a328ea337", &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000380)="316f565088417f5557526845326076cc53f767bfdb6df4aedbcdf4acefcacea25a46cdf3330fff0ea4beeca59f6c384597b648496dc2cb463017095e6db046f0a9160ca34e77f8678a0e5df5f1bf0d4ee8390fb98cbf9964535780039d4ccdc7f49e60ca9c118576a84803c47e4614f8d7f00cda2cfa476ff85cb461117be352885e5ab1437c206d737234a79116cb") openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:42 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], 0x243) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') r2 = fcntl$dupfd(0xffffffffffffffff, 0x406, r1) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f0000001140)="6f31a0884fd98ef08b522001b8c5ef52cdd02d8fa4f92c34fac550a64a7ee7217f00139a959df6df8b79b8275c39da6536a10531ebd08a51310d70695756f070897c201f2281f298c73725bf9fdf31064a7f6c4f076e7a2dc0c70d46e26cf874a5a3ccbb818fb19430a06f44d80cfb5045da6fd2f7ac5a433cc7def8c35494a74a098f4fafb1570c3709b2030e4bbf859d32b6fda3988588db68916bee8ecc05d6d930457a3c6c115c0632ad622b860f886edd1ecb58b73793a5f836b7325dcc6c151501c31f7b93fae91037a8ef067071f53c9849a6cf4eebf19e18c55343808a5937ad06fa2e337abdb3192f1f215461b66e4b89c204f859bfd5f763bf3082a287e51d35110bfc372f091605e85ff7d9ce2248685fd7cd758947c1a299ec7668eb90953b8e05f3fa37c09c12a758142fe7f2260b08a410fd1bf595c1923398ec4e8e57eaf616b27a45829424a46a4fbcea46fa78d06e850a7f76ae7d16c0357058a5a14828f93ac70f958e7588c14690471f7ea3b22a2bc0ffbbfca1a47d0728d8e49073313b58ec8b932f5e6f03132773f70f96e396be7db6b4334dc3858388c94bfc72f92c8199b05cfb7f34af2ce6b68d7502d92b3bf1d54923688394d8adcc0aecc2e3b7fdcd09fb7fe7323e1379c6b1df5b924b47a69cd5a648ae3b911c33f60d29522e8fc4d5eedccc31e72514439f2b89c024a074fda3494dbab8a7a410641536420a897d4ff7c00fc5521bdc63113dcf4cd73c2e70fd6d072657575718e4d45a1b9a081edb6a845edfe455fb09300d77963bb7c3b06becf20debb2202fce015258a5b2a4d9d85f9d06072ce3d926aa12bcd5c5d0f3b902161ac2da805c7395d407c0f9d72b812e736d698e069ee84a9b755df3ff17b6e00d5caa4146a3e1b51c9992b5a5782618367c09b4a92e0ad060fd836d655cf4eb864edf8d9047931a91897b5ef6a37654127ec9cf03f419536bed26ec49a6f73f6877a954cfb2720f04b46d5bdc611a223063d4dab21c9f02981c27f4c5ab02bfd47bda891d09166191b29e8350599fe4f10734d8c3d23099a5afdb09f75540dd6a9937befe44891a68f6d180a7a7aa0675d3c94016812e306ded799e2f7585aff36c92bf30f265d45d4bdfd2263ea8a55c0e97c84d94b02e7b296a85fabdf32fd8a15f6fae33b63707a6c9b67477c99b0b14614c688e7a57c35750ff717ad03b1ece88aab4c8f75cbc1eb90df5da0abeeb75119ba9a3a5dbf5abd436831eec24c860e4d17a963323d8a068572bbfb3c9876670d92838c9edbdc0a98fd19b0ee8aa6915f5023785f4c777affdb2e8f11890f19e9c77d6420beaff0e86dd6c51f46ad3b43a27a896617b6427edfcdf356cc82abd399cef3015c22fe02d5b975dbcc6ae6bfdb297ad1234d475137f58db602ed78f02fd1419ac4527711c3a058ceda7768bbca20fcfa392d13174ba5451c0121ac51d748cba8cf39331c355f0cb138a09ab770d206df01325eb46a72af56de231800b86e2d1c167a992866ffbe4f053979fb3fc43a1da81a9b82e5ae99ac061c0c673b34e5f40f82b463eb417c01656c4bb055ccda3b199cee0ce4e693adf0171e9640ec506c7a9945ae77df24711e542cd69b38d7800f78fb4f311eda34b03adb5e0daaba4aab914582c0797aba6d673189108f63a1c4563724e69a9faabeeb296f8cf29e298b19c3c80f16beb073352cb1ef9ea6c1613abf9e5b15f9bc562d462bad90ff331d7d9582705b2bf42c8726b03dc7ea44dae54e485a681af9438cf62142bbc680e0fb741da70744462af0e652049902faa35c18567c0b0599f6c71458eb1bb633a90b9be7a1bb194ba37bb6f95cfe69cbe4160ef0e246f12fb765fe45e94ac23060d3b1ab0f2aae9c9e8bcbb9d159c446273062ce3df0fdfd6f8876f63852cdd478a5cb3b0849bc60459987ec5b83c68c736caaceee55f1e36e92005d2868bfe119e136c0f44d4182d4c93301a56739a6312886680262597a3207c0b1afe64bcf3296115aeb1051d7bed631c631391e2ac5183cacca3d032b7ba38bf8120834efd749662e3c839e5197a775d4ac1c6869eb76aa9325afb2ad67d44ee74c29ec661c2e7e17c049e83642546a5dc510c33ccd23f3183e7b97b47a8394b933ca66b620d58e4b621b46a5afd4dc5644cb1b12f85bfb4f4c3618dd5534daaddf68b9c19aa434863d411a5c47220ac6d37481cde9eb8a7ba5a501d5de4f5f40b8400fc5eed218d4aa5822cd8aae25c96f541bf58da824e9909ce0b18a177beb9b22e498a8ae52267e96cfd874d8344117355d06f18bbd16d05d65bd91f1eb5f25272c85b5a688d01deb072a83f959712f3f47c11368a5a133a3941fa5fcc9fb6fd2835010da50fd67c0a16eb3ac02f075e9f3f3d9ce2906f974bc57e3cb4d7cfb172d2dbd898c17fe463e7887b763e1c4fc434e8cb5564b14c0318e68a64db6b0fc88d2f3212522624a10d0f184aaea2023a9ebdf176dbf369a7ea8711da268087f5b7ece02a6b381b935f52bac0ca548a76c3b1c580a74d5f1b60580d9346958e2e4a62cbc23fa560ae69c0271f6ca3c863a2afc4a429f9c270d70798d4db857c2a79f4b8f7dfac6c1992e6cf50f9d18a294eabb2d2a734cc551664a80cf688535e4fce0f1c5dbf0e4e30ba260697084ae1d97e4b0f4ce218420b69f89312f6ccd68f6129d636ec1f9a9093948eb385d9ee3109bc4976b271f0ace80723f32bbf16fb894d503a4dbd24032ab71b69b453428aa8083989eee65be00e73aa23b5333be7c9995093140b5e501f16ba7a900c1a3908a58486a6de0299d0a98048c5a74dd5d3fc3865a88665316579bb7f32dfaa2ca0b89993784cbc442d8c2365ac06bf2dc81e06258cf98623d7eb2d3e3a126aa10870abf70e094d4a1a8a7a42ead7d974374728636f864534dacf6ade085b14cd01cc75f599a18a84e60515942e428ec46597a6202d9846d4fd4d3eb12d92aff74c33e97bc666e7613b201ae33578f68b5b049688c8e836b014b26e71433a048dd48ec31020209b238408d1e38e94e7fb83c2937221f4bd077e8aa500493ee9b52e19d190913c3df77588899a3886d54d1f2b49931c359dc956cb64bae96c7e6ed50c9cea441cc93da4a275d51ce29ccc148e2ba0725be4e22e92b8bc970a04abff856abe98eb66376f3dccadcc02d47593703386645650abd96540933bba245f0c5d574b9fe2c85f913119727c5a14ac3946c7700f8262a87fedbb2ac34c46fccaabaf76bcd7bf055f8cc2fdf0ace4457aa0312adb72f1d6c690c99792ae0bc2408cabd9b0739f2bbf3eabd6eed0e943ff131e9b193bae9a9d31b3b79669e14cb6db739a8ad582cee5d774bf3822499cd7779f229659c5391cfbea6f6eac3ba750dbabe4e8e4488fbda8f903ff7284665997ce6971cf895b4aa37575acf13697bf27ec8d3591ccc5a053662b7d74b8dd6d25f87efdabcf24c6c5825a2461d480fff1d37e60724c027162c1ed0e47bb4d7ef2695bf8924c8463ab3a7e1ffdbb1b1724db0eb9b5674ddbc1a4ae886d9a65d4d6bc57dd327bfaccfdf15286bb34de31dde7e6f7550239b3fd586b5252b5aeac5d98a409c4e5f216ac9bcdc5bfe5bdb473cfb6566a63711b2911715efe330f961a3ec3811b27de1c1a0653090ae6ecebfe26d708de0cc17f46d98e3fdf84debf78f1545f15a404a57abdddb698fc8afb99a696e8d67fdc26c0965fbe5696aa6abc00ff9411f85ab91316aed1a2c4520c836eae2ce4a4dfc4973ed546482173ee793f1a6a2e18225f2886015e143f8533ce8c680afc5370616037a4b73ab69b2e66481a257c66c913de0493bd2d6b051156a0bfe4e40c0a44e1a9b8d21bec3084967a9c66972261b5dfd4052712d490db42038a7b94b5d08c358fc81207f83fdeab97fc0276bce5d881c1eeed7223c87ea6674d941b29f083559829d95c08530a7b71031b951e590417b842d8d0c18bba4948dcc0d2018a948c82b7af628bfa4cdf1442113a4d9104d4e5a87c63a9339501d8d6aee853971ce9c7d355de807a5d1e848b2e5989e527c0d91448633f903b16c4913627743536beec3a38cb4436d0c309b5194b7effcae2eb59ab045260551a32bdd7531758e77c11065bb5e83ff23eae4a211dba6a708d2ed084510b61009a52ef8e0a59d7610aff74d248573f99526aa6a3b896f1a11418ce0d99866c77a101d3efa84a4ca1879e3db606c9437cb1793719a91e29062f5018640ec23d0c307a6380af26e009aee3d477ab792e28a9ab745905f0007402aa3bba499eb867ca38cd8ecf3b5d393eac3f63a65091ee772464f8633ff0b605afbc8aaedd0845ddf9d17568988fbcc604c689941d3f7d24a4406f0d566535ce0aa1b56b7da31e27edcdf778882853a9836e1616c87e095158b6092ae21f950d3b4e8e8abdb15744047ce031923ce3802b2c67fe11ebeed4bacd561b1a8be2d18bb1fa1d89f9a9a07960207dbc9a28db544a58de14e87b94ddb3d9ff323372eecf1a1141a2d33d1915b7282ddf3ab0491c6db00930cadaf2efb205320fff521fe8b60ccfd253d840e8537d2395bdb13874d624a443f12978a195e5e8030360b7366fdf7b59d6c7eb5fa51bbd89e2c0440497608582b1b64b4be59199d1860890b042e8b731acfcb511b570ad765161aba7627671e5cc1fb0e55d49f5984e3c3ed1696cceab61e78f370849056d83d15fbd82d877de629fc07a606898c94d6f90cb2cd85e25f98181af20d424dee39ac5971ca8aeab5c4eb624f043b45e60a9159770e039df4724719fecd1331b65742d3714aa96ddc72dc8482011fe8a96549bc204fd2989cc3436b07ba057a6af1764883b148517d5d9bde28a9b6d0ec16e0e84d0ad0111a9ea546a8c9c2c964f1c39c125f991bbfff1c2a44410b11306fa8a5e65d0ef996ce09e8425da7a6845be3e5a20815105a316e2f5029efc225fa09d9220db7604990b5b3679e9fc40ea8071be9125c8ba4c14753580c2d627f970ee1589e86ce7824b093bd9f0eb7133900804828a40f7cbff675bb56e079e18667979b5fcfddd5c6e2083d40694413ad6da7b88703612281261c650b1672e74b2227722919ab4ea921924fa0f8f78d3fc526443d7528c4da32cf50826c42552e645015266466612268783b3c07f11989f5554fb1731cacebf48d5984f1023d16a24eac2c2889f23a5279abe89a98e465d59614b981b6807f1d9771f89f7bcdb7e21063da7912936fdc78bda032495626af17c9be776801bfb420a74b77e4c2c5c58874fafb6431344f63e8575a3eef68726b7c563e2da88409b6cda41f5054a174af0543e0b4aaf449042157f5b964a3bf4e7eaffef5f802de90f10781c30b2d84f8bd0d3c79bf7652a2d5daea110d8428d5cc5921936c1743bbb400bffebc35379be11515d94cf0be7bad8d803c55050da509e5940ee06d510b669bc0997a1f20c495b03c90dd9137206e20e3b4aefb9b7b9d8a8134b6b35ddffb693e1158163ac944cfa09fe8902b5e266b69c1686fd8da777c34b1386c20be5cda859ce4dd670bfc0c9c392b25ef6511f9dbd94f53028a7c239a1ea3ee31f87025652f7fed7298539aabd14ea88a0f94c4467db57a1163eafeb52ee78ed21b7cf8e62843f7702625dd5c7bda58c9a2fdca7d2e4c159946d32e68d7d71db8d175084ff3a4291492ab4eeedaf0fbef1170d31e7a41cae9f8604da56e1236d261ade838e1c0559c0c495ec119849d49876ab3d0f6b4cec9a7484618ec78db90a6e3e0ec1a80a63a0f22cb4", 0x1000, 0xfffffffffffffff8) r4 = request_key(&(0x7f0000000200)='cifs.spnego\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000280)='eth1\x00', 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f00000001c0)='pkcs7_test\x00', &(0x7f00000002c0)=@chain={'key_or_keyring:', r4, ':chain\x00'}) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000100)) 04:13:42 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x60000007, 0x2e0854ef, 0x0, 0x0, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf8", [[]]}, 0x20a) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/status\x00', 0x0, 0x0) socketpair(0x1b, 0x2, 0x80000000, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000240)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) socket(0x0, 0x400000000000003, 0x0) ioctl$BLKIOMIN(r2, 0x1278, &(0x7f00000000c0)) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:42 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x243) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) r2 = dup2(r1, r0) mkdir(0x0, 0x42acf120ec65306d) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r3) r4 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000380)={{{@in=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@local}}, &(0x7f0000000480)=0xe8) accept$packet(r2, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000500)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f00000008c0)={'team0\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000900)={{{@in=@multicast2, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000000a00)=0xe8) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000b40)={'bcsf0\x00', 0x0}) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000c40)={0x0, @multicast2, @remote}, &(0x7f0000000c80)=0xc) getsockname$packet(r4, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d00)=0x14) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000d40)={@mcast1, 0x0}, &(0x7f0000000d80)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r3, &(0x7f0000000e00)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000008}, 0xc, &(0x7f0000000dc0)={&(0x7f0000001140)={0x36c, r5, 0x8, 0x70bd26, 0x25dfdbfe, {}, [{{0x8, 0x1, r6}, {0x1c8, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x200}}, {0x8, 0x6, r7}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0x100000001, 0x6, 0xc56f, 0x3}, {0x5, 0x5, 0x100000001, 0x5}, {0x5, 0x1, 0x350, 0x7f}]}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0xffffffff}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r9}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x81}}, {0x8}}}]}}, {{0x8, 0x1, r10}, {0x100, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r11}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r12}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x401}}, {0x8, 0x6, r13}}}]}}, {{0x8, 0x1, r14}, {0x78, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0xbe}}}]}}]}, 0x36c}, 0x1, 0x0, 0x0, 0x1}, 0x800) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:42 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="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"/522], 0x20a) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000000c0)=0x0) ptrace$getsig(0x4202, r1, 0x3, &(0x7f0000000180)) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) r2 = socket$netlink(0x10, 0x3, 0xf) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000100), 0x10) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) socket(0x0, 0x400000000000003, 0x0) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r3, 0x0, 0x2a, &(0x7f00000004c0)={0xf8, {{0x2, 0x4e21, @loopback}}}, 0x88) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:42 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x243) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) mkdir(0x0, 0x0) fcntl$notify(r0, 0x402, 0x80000020) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r1) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:42 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x60000007, 0x2e0854ef, 0x0, 0x0, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf8", [[]]}, 0x20a) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) pread64(r1, &(0x7f0000000180)=""/148, 0x94, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) socket(0x0, 0x400000000000003, 0x0) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') r3 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) tee(r3, r2, 0xffff, 0x4) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:42 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0x0, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2}, [{0x0, 0x0, 0x0, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x223) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r1, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x6f, 0x1, {0x1, [{0x14, 0x2, 0x4}]}}, 0x16) write(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:42 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80d", [[]]}, 0x1f8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) write$apparmor_exec(r1, &(0x7f00000002c0)=ANY=[], 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) 04:13:42 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x0, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}, {0x60000007, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x243) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) r4 = socket$inet(0x2, 0x6, 0x6) setsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={r1, r2, r3}, 0xc) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r5) r6 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/mls\x00', 0x0, 0x0) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(r6, &(0x7f0000000200)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)={&(0x7f0000000500)={0x198, r7, 0xf00, 0x70bd2c, 0x25dfdbfd, {}, [@TIPC_NLA_LINK={0x10, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_SOCK={0x24, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x400}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_BEARER={0xdc, 0x1, [@TIPC_NLA_BEARER_NAME={0x8, 0x1, @l2={'ib', 0x3a, '\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x9, @rand_addr="619bc217dedd122f3ca210625c0bff12", 0x40}}, {0x14, 0x2, @in={0x2, 0x4e20, @empty}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @local}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x7, @mcast2, 0x2}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @rand_addr=0x2}}, {0x14, 0x2, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @multicast2}}, {0x14, 0x2, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}]}, @TIPC_NLA_BEARER={0xc, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x83}]}, @TIPC_NLA_BEARER={0x68, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x10000}, @TIPC_NLA_BEARER_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x89}]}, @TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'eth', 0x3a, 'ip6gretap0\x00'}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffffffffffff}]}]}]}, 0x198}, 0x1, 0x0, 0x0, 0x1}, 0x10) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:42 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x0, 0x0, 0x9, 0x0, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab87"}, 0xfe) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) r2 = accept4$packet(r0, &(0x7f00000000c0), &(0x7f0000000100)=0x14, 0x800) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000140)) mkdir(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, r1) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:42 executing program 0: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0xfe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x412002) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2010080}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0xa0, r1, 0x8, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5fa}, @IPVS_CMD_ATTR_DAEMON={0x44, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xfffffffffffff801}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'nr0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x7}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_to_hsr\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x1f}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xd85}]}, 0xa0}}, 0x80) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) mkdir(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:42 executing program 1: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000000c0)) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x2c001, 0x0) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a00000000", 0x23) write$apparmor_exec(r0, &(0x7f00000002c0)=ANY=[], 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') 04:13:42 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x0, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}, {0x60000007, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x243) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r1) openat$full(0xffffffffffffff9c, 0x0, 0x20080, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:42 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0x0, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2}, [{0x0, 0x0, 0x0, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x223) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r1, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x6f, 0x1, {0x1, [{0x14, 0x2, 0x4}]}}, 0x16) write(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:42 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0x0, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2}, [{0x0, 0x0, 0x0, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x223) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r1, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x6f, 0x1, {0x1, [{0x14, 0x2, 0x4}]}}, 0x16) write(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:42 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="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"/522], 0x20a) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) sendto$inet(r1, &(0x7f00000004c0)="02fccf8e7f3e99ff775a579af8a563ff358838afff565a70f42c4a957325754341a5cb02207568c5ada403699a58ca938c80087212873e5f7e5acac83f16fd2df9dd154aa7bb677c2d60ed8ec86e3bb2bb486fd1304b99b35c2caed4a21a2c4982fc7f146983ff3b902095c1f5be1b1f649f4cae06999cc7dd5493d013d4ba3bf6e0f3feca92463045948b5fdd1d790315d2df0073fc8e5e98ea8219f470813b992907d798207a989de59860267494acb715fc39d5cfc128930c16330f6e65292db1f8dc8351f576df97d8552404a7af6365e4fd94bb4c2a1cb5a9f95d112ef94f14a4fda37c21314e1a", 0xea, 0x20004001, &(0x7f00000000c0)={0x2, 0x4e20, @loopback}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) socket(0x0, 0x400000000000003, 0x0) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:43 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0x0, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2}, [{0x0, 0x0, 0x4, 0x0, 0x34af, 0x80, 0xff, 0xffffffff}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x223) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r1, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x6f, 0x1, {0x1, [{0x14, 0x2, 0x4}]}}, 0x16) write(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:43 executing program 1: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000000c0)) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x2c001, 0x0) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a00000000", 0x23) write$apparmor_exec(r0, &(0x7f00000002c0)=ANY=[], 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') 04:13:43 executing program 0: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x0, 0x0, 0x9, 0x0, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab87"}, 0xfe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) mkdir(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') ioctl$TIOCSERGETLSR(r0, 0x5459, &(0x7f00000000c0)) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x2, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, r0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:43 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x60000007, 0x2e0854ef, 0x0, 0x0, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf8", [[]]}, 0x20a) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000100)={0x2b, 0x4, 0x0, {0x0, 0x8, 0x3, 0x0, [0x0, 0x0, 0x0]}}, 0x2b) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002680)=[{{&(0x7f00000001c0)=@nfc, 0x80, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/174, 0xae}], 0x1, &(0x7f00000005c0)=""/82, 0x52}, 0x2}, {{&(0x7f0000000640)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000800)=[{&(0x7f00000006c0)=""/180, 0xb4}, {&(0x7f0000000780)=""/66, 0x42}], 0x2, &(0x7f0000000840)=""/239, 0xef}, 0x1}, {{&(0x7f0000000940)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @local}}, 0x80, &(0x7f0000001bc0)=[{&(0x7f00000009c0)}, {&(0x7f0000000a00)=""/7, 0x7}, {&(0x7f0000000a40)=""/11, 0xb}, {&(0x7f0000000a80)=""/4096, 0x1000}, {&(0x7f0000001a80)=""/222, 0xde}, {&(0x7f0000001b80)=""/47, 0x2f}], 0x6, &(0x7f0000001c40)=""/145, 0x91}, 0xffffffffffffff81}, {{&(0x7f0000001d00)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x80, &(0x7f0000001e80)=[{&(0x7f0000001d80)=""/239, 0xef}], 0x1, &(0x7f0000001ec0)=""/154, 0x9a}, 0x91}, {{&(0x7f0000001f80)=@l2, 0x80, &(0x7f0000002100)=[{&(0x7f0000002000)=""/208, 0xd0}], 0x1, &(0x7f0000002140)=""/120, 0x78}, 0x40}, {{&(0x7f00000021c0)=@isdn, 0x80, &(0x7f0000002540)=[{&(0x7f0000002240)=""/179, 0xb3}, {&(0x7f0000002300)=""/189, 0xbd}, {&(0x7f00000023c0)=""/184, 0xb8}, {&(0x7f0000002480)=""/179, 0xb3}], 0x4, &(0x7f0000002580)=""/227, 0xe3}, 0x7ff}], 0x6, 0x2, &(0x7f0000002800)) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000180)) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) socket(0x0, 0x400000000000003, 0x0) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x1, 0x0) 04:13:43 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x243) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) io_setup(0x0, &(0x7f0000000100)) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r1) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:43 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0x0, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2}, [{0x0, 0x0, 0x0, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x223) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r1, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x6f, 0x1, {0x1, [{0x14, 0x2, 0x4}]}}, 0x16) write(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:43 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0x0, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2}, [{0x0, 0x0, 0x0, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x223) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r1, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x6f, 0x1, {0x1, [{0x14, 0x2, 0x4}]}}, 0x16) write(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:43 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0xfffffffffffffffb, 0x8000) r1 = getpgid(0xffffffffffffffff) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x2, r1}) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c4600080023060000000000000002003e0000000000b8000000380000002a02000005000000070020000200ff0102000000000000ef54082efcffffff0000000000000000090000000000000009000000a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc268422956c44a603c089399491c80da29aacb8ab870000000000"], 0xfe) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) mkdir(0x0, 0x0) write(r2, 0x0, 0xffffffffffffff56) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, r3) r4 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000300)) setsockopt$IP_VS_SO_SET_EDITDEST(r4, 0x0, 0x489, &(0x7f0000000280)={{0xff, @remote, 0x4e23, 0x1, 'lblcr\x00', 0x2, 0x8, 0x69}, {@multicast2, 0x4e22, 0x2, 0x2, 0x4, 0x80000000}}, 0x44) 04:13:43 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x60000007, 0x2e0854ef, 0x0, 0x0, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf8", [[]]}, 0x20a) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) socket(0x0, 0x400000000000003, 0x0) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') r1 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) lseek(r1, 0x0, 0x7) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:43 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x0, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}, {0x60000007, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x243) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r1) ioctl$sock_inet_SIOCGARP(r1, 0x8954, &(0x7f0000000100)={{0x2, 0x4e20, @multicast2}, {0x6, @dev={[], 0xc}}, 0x12, {0x2, 0x4e22, @empty}, 'nlmon0\x00'}) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:43 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0x0, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2}, [{0x0, 0x0, 0x4, 0x0, 0x34af, 0x80, 0xff, 0xffffffff}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x223) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r1, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x6f, 0x1, {0x1, [{0x14, 0x2, 0x4}]}}, 0x16) write(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:43 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0x0, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2}, [{0x0, 0x0, 0x0, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x223) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r1, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x6f, 0x1, {0x1, [{0x14, 0x2, 0x4}]}}, 0x16) write(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:43 executing program 0: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="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"], 0xfe) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) mkdir(0x0, 0x0) flistxattr(r0, &(0x7f0000000180)=""/64, 0x40) write(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, r1) openat$full(0xffffffffffffff9c, 0x0, 0x8, 0x0) 04:13:43 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f61fe4), 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup3(r1, r0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"/754], 0x243) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0x0, r2, 0x0, 0x4f, &(0x7f00000004c0)='+%posix_acl_accessvmnet1keyring**[eth0user\\vmnet1$.,vmnet0/\\em0}lokeyringppp0.\x00', 0xffffffffffffffff}, 0x30) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x60, 0x0, 0x0, 0x0, 0x1, 0x437d2f, 0xfffffffffffffffe, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2, 0x0, 0x0, 0x2}, r4, 0xf, 0xffffffffffffffff, 0xfffffffffffffffc) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) write$UHID_INPUT(r2, &(0x7f0000001140)={0x8, "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", 0x1000}, 0x1006) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r5, 0x4008240b, &(0x7f0000000140)={0x2, 0x70, 0x3, 0x4, 0x2, 0x7c41, 0x0, 0x6, 0x0, 0x8, 0x4, 0x3, 0x1, 0x0, 0x4, 0x7fff, 0x7, 0x5, 0xff, 0xfffffffffffffff8, 0x4, 0x1, 0x3, 0x7ff, 0x1ff, 0x6, 0x8, 0x1, 0x4326c0e5, 0x9, 0x6, 0x5, 0x5, 0xffffffff, 0x101, 0x3, 0x20, 0x118, 0x0, 0x250d5362, 0x4, @perf_bp={&(0x7f0000000100), 0x1}, 0x14000, 0xf47a, 0x0, 0x5, 0x5, 0x1, 0x10001}) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r6) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:43 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/525], 0x20a) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x2, 0x0) socket(0x0, 0x400000000000003, 0x0) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:43 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0x0, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2}, [{0x0, 0x0, 0x4, 0x0, 0x34af, 0x80, 0xff, 0xffffffff}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x223) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r1, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x6f, 0x1, {0x1, [{0x14, 0x2, 0x4}]}}, 0x16) write(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:43 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0x0, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2}, [{0x0, 0x0, 0x4, 0x0, 0x34af, 0x80, 0xff, 0xffffffff}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x223) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r1, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x6f, 0x1, {0x1, [{0x14, 0x2, 0x4}]}}, 0x16) write(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:43 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0x0, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2}, [{0x0, 0x0, 0x0, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x223) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r1, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x6f, 0x1, {0x1, [{0x14, 0x2, 0x4}]}}, 0x16) write(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:43 executing program 0: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x0, 0x0, 0x9, 0x0, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab87"}, 0xfe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) mkdir(0x0, 0x198) write(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000080)=0x7, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, r0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:43 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x60000007, 0x2e0854ef, 0x0, 0x0, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf8", [[]]}, 0x20a) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$EVIOCGABS20(r1, 0x80184560, &(0x7f0000000a40)=""/201) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000d40)='/selinux/policy\x00', 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d80), 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) r3 = socket(0x0, 0x400000000000003, 0x0) io_setup(0x3ff, &(0x7f0000000080)=0x0) clock_gettime(0x0, &(0x7f0000000980)={0x0, 0x0}) io_getevents(r4, 0x380000, 0x5, &(0x7f00000008c0)=[{}, {}, {}, {}, {}], &(0x7f00000009c0)={r5, r6+30000000}) sendmsg$sock(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f00000000c0)="4283ba5bdefe3a52a1a533f121c11dff2c1e15691a740bb939ea27e5dae0dae67d", 0x21}, {&(0x7f0000000180)="9a5c8536c116042b86f8ecc518d9a57c125434375c159ee29fcccd1c46fa76544ee6dd9ae8162ae995f470f11dc4a5aea7e2df734d796ef0bf6b66bc56289a1e70ff1a0d8aecfab79d291959e08952ce49b8ab767522b24bd89f996ea7cf3e29511c8d4a9385c491b276c89bd811e9872ee2d62db4a70194ab8eff22a78bf98220ce67599e1a3c6646a51f668955c12c824c4ea22f1e7b109fa42bdf631ce93ad04d064a", 0xa4}, {&(0x7f00000004c0)="a063dde52144c6b38ccc7632360c602849aa49c3fa0efc733934a3b816e9f34eaef5090c3ac8fcf8d134dbe51f74bae0e39c54886e0c27dab5100eb3a92fc20227f3aaa8b22db59d278735ddc642d1a55ed2b287203ee0181f4a061024a95865c6d4c9c05291183c7fbbb48378163020", 0x70}, {&(0x7f0000000540)="8cbccb70e41d31b4ad6b0fd0a25e4dc6313b8dfa1d0d127328954011c9b053d8d71e365693810604ef1bc5913a218023ecffb6913ff769179f9b50c0b5d784ffa2a65056020a3ba4c02d4445ecc3ddfe05a0e6318bded6a67117159ffd3ffe8ec1ac4114bd3d070944ce82b0f6ebbeceba21e52ddc7d048f73bbf32f43d1d3e86fac7f82cfb8af65b55a206b88b47fe0990242091c10503a49b4b9ffb73fb99b50130d37384938dd75303e43fa88507ddcaaf6eda01f6e3e27a4cb581b0a161d21fed70548f4", 0xc6}, {&(0x7f0000000640)="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", 0xfc}, {&(0x7f0000000740)="98c5bf08be62af3583aa539932cb40f2832be9dbd7d85716b3a34575177af3c33410c98914ca388d3ef9564f54756d5fe91177d116a393b0ac88d2cf66c80d3cb3d0cad7dddf10e841c3428e1007b13fb7f1074e44d6d8549f9ec970f9ec8587ee04236fd677efc59715295b6edd32e913089be0d2d59df99116e3556b0ab4053667806cb34bdec2ad9c815543f18ed6676491d2d750025c2d902b641303ca0bdceaeee5417553c0e6a845b86b984ded49816cf8efdc6b0a8cb7350568c96810024322821222d8422441a28977b4631cbaedbe5dc6", 0xd5}], 0x6}, 0x8000) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:43 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="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"/613], 0x243) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x1200020fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) mkdir(0x0, 0x0) r1 = socket$unix(0x1, 0x7, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000480)=0xfd0426cf) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x21, 0x101) 04:13:43 executing program 4: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000000c0)) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x2c001, 0x0) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a000000", 0x22) write$apparmor_exec(r0, &(0x7f00000002c0)=ANY=[], 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') 04:13:43 executing program 0: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x0, 0x0, 0x9, 0x0, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab87"}, 0xfe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) mkdir(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) chmod(&(0x7f0000000080)='./file0\x00', 0x190) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, r0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:43 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vga_arbiter\x00', 0x400000, 0x0) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000800)=""/4096) write$binfmt_elf32(r0, &(0x7f0000001bc0)=ANY=[@ANYBLOB="7f454c4600089c230600000000000000b8000000380000000000000000e5a500070020000200ff01020000f00000000007000060ef54082e000000000000000001000100090000000500000009000000a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262b78e8efb8e55f53b313d1e4b1e22c2d6c8fbee99aeed1527fc1c6ab14270caa657bd4f82bcc5b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53ebac4aa1abf80000000000000000000000000000000000000000000000000000000000000000000000000000000000ae4c25650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001100000000000000000000000001000000000000170000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002cf39354d3fb68e0d54fe7618b14fd624b23c27070718b56d770b76c58e403b56f801390aed3ebc4b0ec73ef93e65a17213710053b14601f57ba1b706fbc83a4d3e9869ea48c1d23618911aeb9366fd87b5f8fb9e34dae2eec8e1e8ef52973d16a514dc9969b68b031a00c59b4fda4eaf93106f7a63e5abf56db2d24582872380448b4e1586a615425acbcc49200911512f850baafff299e82684758ed581610bc0791f9f08b6ac0d8acae0d6109832e22a7e21db70950c3520461de0d45f1099ea953925919c40b1e05212ba8456d3ac4ff26b31e2288b4872f25cc08d341cb0fc14692aca8fd42c6601be68808131cafa7a90b897671d2fe903ca62e2ca7e345b2c0608944a5d74b9419507ee1b48d7d28f3711ffcfa0cdf318ddc"], 0x20a) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/status\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r3, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r3, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000380)={&(0x7f0000001800)=ANY=[@ANYBLOB="20030000", @ANYRES16=r4, @ANYBLOB="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"], 0x320}}, 0x40) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) r6 = socket(0x0, 0x400000000000003, 0x0) ioctl$PPPIOCSCOMPRESS(r5, 0x4010744d) ioctl$PPPIOCGFLAGS1(r3, 0x8004745a, &(0x7f0000000280)) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd\"+\x00') prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r6) ioctl$TIOCGWINSZ(r3, 0x5413, &(0x7f00000002c0)) accept4(r3, &(0x7f0000000400), &(0x7f0000000480)=0x80, 0x80000) ioctl$PPPIOCSCOMPRESS(r2, 0x4010744d) openat$full(0xffffffffffffff9c, 0x0, 0x4001, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$packet_int(r3, 0x107, 0x1b, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 04:13:43 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x60000007, 0x2e0854ef, 0x0, 0x0, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf8", [[]]}, 0x20a) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) socket(0x0, 0x400000000000003, 0x0) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="00012bbd7000ffdbdf2501000000000000000841000000140018000000077564703a73797a3100a06c4999722a5e5a000000"], 0x30}, 0x1, 0x0, 0x0, 0x8000}, 0x40) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f0000000500)="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") 04:13:43 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vga_arbiter\x00', 0x400000, 0x0) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000800)=""/4096) write$binfmt_elf32(r0, &(0x7f0000001bc0)=ANY=[@ANYBLOB="7f454c4600089c230600000000000000b8000000380000000000000000e5a500070020000200ff01020000f00000000007000060ef54082e000000000000000001000100090000000500000009000000a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262b78e8efb8e55f53b313d1e4b1e22c2d6c8fbee99aeed1527fc1c6ab14270caa657bd4f82bcc5b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53ebac4aa1abf80000000000000000000000000000000000000000000000000000000000000000000000000000000000ae4c25650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001100000000000000000000000001000000000000170000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002cf39354d3fb68e0d54fe7618b14fd624b23c27070718b56d770b76c58e403b56f801390aed3ebc4b0ec73ef93e65a17213710053b14601f57ba1b706fbc83a4d3e9869ea48c1d23618911aeb9366fd87b5f8fb9e34dae2eec8e1e8ef52973d16a514dc9969b68b031a00c59b4fda4eaf93106f7a63e5abf56db2d24582872380448b4e1586a615425acbcc49200911512f850baafff299e82684758ed581610bc0791f9f08b6ac0d8acae0d6109832e22a7e21db70950c3520461de0d45f1099ea953925919c40b1e05212ba8456d3ac4ff26b31e2288b4872f25cc08d341cb0fc14692aca8fd42c6601be68808131cafa7a90b897671d2fe903ca62e2ca7e345b2c0608944a5d74b9419507ee1b48d7d28f3711ffcfa0cdf318ddc"], 0x20a) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/status\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r3, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r3, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000380)={&(0x7f0000001800)=ANY=[@ANYBLOB="20030000", @ANYRES16=r4, @ANYBLOB="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"], 0x320}}, 0x40) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) r6 = socket(0x0, 0x400000000000003, 0x0) ioctl$PPPIOCSCOMPRESS(r5, 0x4010744d) ioctl$PPPIOCGFLAGS1(r3, 0x8004745a, &(0x7f0000000280)) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd\"+\x00') prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r6) ioctl$TIOCGWINSZ(r3, 0x5413, &(0x7f00000002c0)) accept4(r3, &(0x7f0000000400), &(0x7f0000000480)=0x80, 0x80000) ioctl$PPPIOCSCOMPRESS(r2, 0x4010744d) openat$full(0xffffffffffffff9c, 0x0, 0x4001, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$packet_int(r3, 0x107, 0x1b, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 04:13:43 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0x0, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2}, [{0x0, 0x0, 0x4, 0x80000000, 0x0, 0x80, 0xff, 0xffffffff}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x223) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r1, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x6f, 0x1, {0x1, [{0x14, 0x2, 0x4}]}}, 0x16) write(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:43 executing program 0: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c4600080023060000000000000002003e8196730000000000b8000000380000002a02000005000000070020000200ff01020000f00000000000000000ef54082efcffffff0000000000000000090000000000000009000000a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91e751dfc0a6bd92ccb091619be607e7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc269e979f72087c14c983a432e93ec1bf842295399491c80da29aacb8ab000000000000e7f30907b006b9867b5d0de21da4fc5af0f5e460a3454225d9432c78354180a1bd683ed063e3b61fdb16cf361b069d223a383f289205a634c5901842b4ee053dfb6133cb00c832970a7e7c8d5cb312043854e8ac7cf1dbb0853ec047aaf40991f959f884df4d7c9441798ccc510161eb"], 0xfe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) mkdir(0x0, 0x10000000000024) write(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, r0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:43 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x60000007, 0x2e0854ef, 0x0, 0x0, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf8", [[]]}, 0x20a) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) socket(0x0, 0x400000000000003, 0x0) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) fsetxattr(r1, &(0x7f00000000c0)=@random={'security.', '#\x00'}, &(0x7f0000000100)='/dev/loop#\x00', 0xb, 0x3) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$setstatus(r0, 0x4, 0x44000) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:43 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vga_arbiter\x00', 0x400000, 0x0) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000800)=""/4096) write$binfmt_elf32(r0, &(0x7f0000001bc0)=ANY=[@ANYBLOB="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"], 0x20a) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/status\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r3, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r3, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000380)={&(0x7f0000001800)=ANY=[@ANYBLOB="20030000", @ANYRES16=r4, @ANYBLOB="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"], 0x320}}, 0x40) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) r6 = socket(0x0, 0x400000000000003, 0x0) ioctl$PPPIOCSCOMPRESS(r5, 0x4010744d) ioctl$PPPIOCGFLAGS1(r3, 0x8004745a, &(0x7f0000000280)) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd\"+\x00') prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r6) ioctl$TIOCGWINSZ(r3, 0x5413, &(0x7f00000002c0)) accept4(r3, &(0x7f0000000400), &(0x7f0000000480)=0x80, 0x80000) ioctl$PPPIOCSCOMPRESS(r2, 0x4010744d) openat$full(0xffffffffffffff9c, 0x0, 0x4001, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$packet_int(r3, 0x107, 0x1b, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 04:13:44 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0x0, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2}, [{0x0, 0x0, 0x4, 0x80000000, 0x0, 0x80, 0xff, 0xffffffff}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x223) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r1, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x6f, 0x1, {0x1, [{0x14, 0x2, 0x4}]}}, 0x16) write(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:44 executing program 0: syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x101, 0x8002) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c46000800230600ff000000000002003e0000000000b800e3dd6ad1c6f7670000380000002a02000005000000070020000200ff01020000f00000000000000000ef54082efcffffff0000000000000000090000000000000009000000a3d371d99314c44da8835dbfc490655cdfc89a3b4a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381b262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab87626b855965c22715db5ba6c8ed1f69201a8baa76e323c3da72df73e8bf7e873ef250f48c64da639a9c"], 0xfe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) futex(&(0x7f00000001c0)=0x1, 0x80, 0x2, &(0x7f0000000280), &(0x7f00000002c0), 0x1) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) mkdir(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, r0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:44 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) socketpair(0x9, 0x0, 0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, &(0x7f0000000140)={'syzkaller1\x00', 0x7ca}) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x0, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}, {0x60000007, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x243) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f00000000c0)) getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, 0x0, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000180)=0xc) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r3) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:44 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x60000007, 0x2e0854ef, 0x0, 0x0, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf8", [[]]}, 0x20a) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) socket(0x0, 0x400000000000003, 0x0) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:44 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vga_arbiter\x00', 0x400000, 0x0) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000800)=""/4096) write$binfmt_elf32(r0, &(0x7f0000001bc0)=ANY=[@ANYBLOB="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"], 0x20a) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/status\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r3, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r3, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000380)={&(0x7f0000001800)=ANY=[@ANYBLOB="20030000", @ANYRES16=r4, @ANYBLOB="080227bd7000fedbdf25140000007001010034000200080004000100000008000100110000000800020000010000080002000100000008000400f07ecd1b080001001b000000380004001400010002004e23000000000000000000000000200002000a004e2400000001ff0100000000000000000000000000010700000044000400200001000a004e240000000600000000000000000000ffffac1e010100000000200002000a004e21000008aafe8000000000000000000000000000aa0000000038000400200001000a004e200000fb1f00000000000000000000000000000000080000001400020002004e24ac1e000100000000000000002c0004001400010002004e20ac1414aa00000000000000001400020002004e20ac1e00010000000000000000100001007564703a73797a30000000001400010069623a7465616d5f736c6176655f310008000300000100002c0004001400010002004e207f00000100000000000000001400020002004e20000000000000000000000000500007000800020003000000080001004000000008000100040000000c00030002000000000000000c00030005000000000000000c0004003f00000000000000080002000400000008000200040000002400020008000176b1a6547bad479b0000000000080001000900000008000200ffffff7f080001000000000010000200080001000000000004000400180104001c0007000800020002000000080003000e0200000800030066d600000c00010073797a31000000003400070008000400b30b00000800010019000000080004000600000008000200091000000800040009000000080002000700000024000700080001000b0000000800030009000000080002000700000008000400060000001400010062726f6164636173742d6c696e6b00004400070008000300030000000800020008000000080003000500000008000400010000000800040001fcffff080001001b0000000800020004000000080004000400000014000700080002000500000008000400000001001c0007000800020008000000080003008b000000080001000c0000000c000100"], 0x320}}, 0x40) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) r6 = socket(0x0, 0x400000000000003, 0x0) ioctl$PPPIOCSCOMPRESS(r5, 0x4010744d) ioctl$PPPIOCGFLAGS1(r3, 0x8004745a, &(0x7f0000000280)) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd\"+\x00') prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r6) ioctl$TIOCGWINSZ(r3, 0x5413, &(0x7f00000002c0)) accept4(r3, &(0x7f0000000400), &(0x7f0000000480)=0x80, 0x80000) ioctl$PPPIOCSCOMPRESS(r2, 0x4010744d) openat$full(0xffffffffffffff9c, 0x0, 0x4001, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$packet_int(r3, 0x107, 0x1b, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 04:13:44 executing program 0: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x0, 0x0, 0x9, 0x0, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab87"}, 0xfe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) r0 = creat(&(0x7f0000000100)='./file0\x00', 0xa4) mkdirat(r0, &(0x7f0000000140)='./file0\x00', 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) mkdir(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/status\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000000c0)={0xffffffff, 0xff, 0x3, 0x7, 0x1a, 0x7984, 0x98, 0x3, 0x9e49, 0x8000, 0x7, 0xfffffffffffffc00}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:44 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0x0, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2}, [{0x0, 0x0, 0x4, 0x80000000, 0x0, 0x80, 0xff, 0xffffffff}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x223) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r1, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x6f, 0x1, {0x1, [{0x14, 0x2, 0x4}]}}, 0x16) write(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:44 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vga_arbiter\x00', 0x400000, 0x0) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000800)=""/4096) write$binfmt_elf32(r0, &(0x7f0000001bc0)=ANY=[@ANYBLOB="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"], 0x20a) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/status\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r3, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r3, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000380)={&(0x7f0000001800)=ANY=[@ANYBLOB="20030000", @ANYRES16=r4, @ANYBLOB="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"], 0x320}}, 0x40) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) r6 = socket(0x0, 0x400000000000003, 0x0) ioctl$PPPIOCSCOMPRESS(r5, 0x4010744d) ioctl$PPPIOCGFLAGS1(r3, 0x8004745a, &(0x7f0000000280)) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd\"+\x00') prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r6) ioctl$TIOCGWINSZ(r3, 0x5413, &(0x7f00000002c0)) accept4(r3, &(0x7f0000000400), &(0x7f0000000480)=0x80, 0x80000) ioctl$PPPIOCSCOMPRESS(r2, 0x4010744d) openat$full(0xffffffffffffff9c, 0x0, 0x4001, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$packet_int(r3, 0x107, 0x1b, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 04:13:44 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x60000007, 0x2e0854ef, 0x0, 0x0, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf8", [[]]}, 0x20a) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) mount(&(0x7f0000000100)=@sr0='/dev/sr0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='exofs\x00', 0x20000, &(0x7f0000000240)='fd/3\x00') getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffffffffffff, 0x4) signalfd4(r2, &(0x7f0000000600)={0x7}, 0x8, 0x80800) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000005c0)={r2, 0x0, 0x7b, 0x8, &(0x7f0000000500)="ecea3592c38d442746a6a20258843e3b2befa2617a93b00b830a5c04dd87b8f411706683e8d24b5e55692427faa547f1f823915a59bb8bab1ecf391abd9aa48aa19ce9e753592ecbd81414ab7e46010cd8948e796948b65ead67d5539f4589e659b46d26394c47754dae3c4a82ca64b63f1c1a83ed7fbe78252c2f", &(0x7f0000000580)=""/8, 0x95}, 0x28) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000640)=0xc, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) socket(0x0, 0x400000000000003, 0x0) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:44 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000100)={0x0, r0, 0x7, 0x1}, 0x14) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x0, 0x0, 0x9, 0x0, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab87"}, 0xfe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x80000) write$P9_RLERROR(r1, &(0x7f00000000c0)={0x14, 0x7, 0x1, {0xb, '&)self^self'}}, 0x14) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) mkdir(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') pselect6(0x40, &(0x7f0000000140)={0x5, 0xfffffffffffffffa, 0x1, 0x7, 0x3ff, 0x8, 0xfffffffffffeffff, 0x1}, &(0x7f0000000180)={0x8, 0x81c6, 0xf32, 0x1, 0x7fff, 0x9a, 0x9, 0x10001}, &(0x7f00000001c0)={0x7f, 0x9, 0x65, 0x5, 0x8, 0x200, 0x10001}, &(0x7f0000000200)={0x77359400}, &(0x7f00000003c0)={&(0x7f0000000380)={0x517a}, 0x8}) fcntl$dupfd(0xffffffffffffffff, 0x0, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:44 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0x0, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2}, [{0x0, 0x0, 0x4, 0x80000000, 0x34af, 0x0, 0xff, 0xffffffff}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x223) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r1, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x6f, 0x1, {0x1, [{0x14, 0x2, 0x4}]}}, 0x16) write(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:44 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vga_arbiter\x00', 0x400000, 0x0) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000800)=""/4096) write$binfmt_elf32(r0, &(0x7f0000001bc0)=ANY=[@ANYBLOB="7f454c4600089c230600000000000000b8000000380000000000000000e5a500070020000200ff01020000f00000000007000060ef54082e000000000000000001000100090000000500000009000000a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262b78e8efb8e55f53b313d1e4b1e22c2d6c8fbee99aeed1527fc1c6ab14270caa657bd4f82bcc5b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53ebac4aa1abf80000000000000000000000000000000000000000000000000000000000000000000000000000000000ae4c25650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001100000000000000000000000001000000000000170000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002cf39354d3fb68e0d54fe7618b14fd624b23c27070718b56d770b76c58e403b56f801390aed3ebc4b0ec73ef93e65a17213710053b14601f57ba1b706fbc83a4d3e9869ea48c1d23618911aeb9366fd87b5f8fb9e34dae2eec8e1e8ef52973d16a514dc9969b68b031a00c59b4fda4eaf93106f7a63e5abf56db2d24582872380448b4e1586a615425acbcc49200911512f850baafff299e82684758ed581610bc0791f9f08b6ac0d8acae0d6109832e22a7e21db70950c3520461de0d45f1099ea953925919c40b1e05212ba8456d3ac4ff26b31e2288b4872f25cc08d341cb0fc14692aca8fd42c6601be68808131cafa7a90b897671d2fe903ca62e2ca7e345b2c0608944a5d74b9419507ee1b48d7d28f3711ffcfa0cdf318ddc"], 0x20a) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/status\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r3, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r3, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000380)={&(0x7f0000001800)=ANY=[@ANYBLOB="20030000", @ANYRES16=r4, @ANYBLOB="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"], 0x320}}, 0x40) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) r6 = socket(0x0, 0x400000000000003, 0x0) ioctl$PPPIOCSCOMPRESS(r5, 0x4010744d) ioctl$PPPIOCGFLAGS1(r3, 0x8004745a, &(0x7f0000000280)) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd\"+\x00') prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r6) ioctl$TIOCGWINSZ(r3, 0x5413, &(0x7f00000002c0)) accept4(r3, &(0x7f0000000400), &(0x7f0000000480)=0x80, 0x80000) ioctl$PPPIOCSCOMPRESS(r2, 0x4010744d) openat$full(0xffffffffffffff9c, 0x0, 0x4001, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$packet_int(r3, 0x107, 0x1b, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 04:13:44 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x200, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x60000007, 0x2e0854ef, 0x0, 0x0, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf8", [[]]}, 0x20a) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) pipe2(&(0x7f0000000100), 0x4800) socket$inet6_tcp(0xa, 0x1, 0x0) accept$inet(r0, &(0x7f0000000180), &(0x7f00000001c0)=0x10) socket$inet_tcp(0x2, 0x1, 0x0) openat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x2000, 0x21) socket$inet(0x2, 0x1, 0x7f) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000500)='/selinux/status\x00', 0x0, 0x0) ioctl$sock_SIOCSPGRP(r2, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) socket(0x0, 0x400000000000003, 0x0) write$apparmor_exec(0xffffffffffffffff, 0x0, 0xef) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$getownex(r1, 0x10, &(0x7f00000000c0)) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:44 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vga_arbiter\x00', 0x400000, 0x0) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000800)=""/4096) write$binfmt_elf32(r0, &(0x7f0000001bc0)=ANY=[@ANYBLOB="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"], 0x20a) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/status\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r3, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r3, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000380)={&(0x7f0000001800)=ANY=[@ANYBLOB="20030000", @ANYRES16=r4, @ANYBLOB="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"], 0x320}}, 0x40) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) r6 = socket(0x0, 0x400000000000003, 0x0) ioctl$PPPIOCSCOMPRESS(r5, 0x4010744d) ioctl$PPPIOCGFLAGS1(r3, 0x8004745a, &(0x7f0000000280)) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd\"+\x00') prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r6) ioctl$TIOCGWINSZ(r3, 0x5413, &(0x7f00000002c0)) accept4(r3, &(0x7f0000000400), &(0x7f0000000480)=0x80, 0x80000) ioctl$PPPIOCSCOMPRESS(r2, 0x4010744d) openat$full(0xffffffffffffff9c, 0x0, 0x4001, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$packet_int(r3, 0x107, 0x1b, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 04:13:44 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x0, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}, {0x60000007, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x243) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) write(0xffffffffffffffff, &(0x7f0000000100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0xffffffffffffff7a) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r1) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:44 executing program 0: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x0, 0x0, 0x9, 0x0, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab87"}, 0xfe) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) r1 = dup3(r0, r0, 0x80000) getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) mkdir(0x0, 0x0) write(r1, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:44 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0x0, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2}, [{0x0, 0x0, 0x4, 0x80000000, 0x34af, 0x0, 0xff, 0xffffffff}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x223) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r1, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x6f, 0x1, {0x1, [{0x14, 0x2, 0x4}]}}, 0x16) write(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:44 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vga_arbiter\x00', 0x400000, 0x0) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000800)=""/4096) write$binfmt_elf32(r0, &(0x7f0000001bc0)=ANY=[@ANYBLOB="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"], 0x20a) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/status\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r3, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r3, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000380)={&(0x7f0000001800)=ANY=[@ANYBLOB="20030000", @ANYRES16=r4, @ANYBLOB="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"], 0x320}}, 0x40) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) r6 = socket(0x0, 0x400000000000003, 0x0) ioctl$PPPIOCSCOMPRESS(r5, 0x4010744d) ioctl$PPPIOCGFLAGS1(r3, 0x8004745a, &(0x7f0000000280)) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd\"+\x00') prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r6) ioctl$TIOCGWINSZ(r3, 0x5413, &(0x7f00000002c0)) accept4(r3, &(0x7f0000000400), &(0x7f0000000480)=0x80, 0x80000) ioctl$PPPIOCSCOMPRESS(r2, 0x4010744d) openat$full(0xffffffffffffff9c, 0x0, 0x4001, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$packet_int(r3, 0x107, 0x1b, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 04:13:44 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x20000005, 0x0, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}, {0x60000007, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x243) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCADDDLCI(r1, 0x8980, &(0x7f0000000100)={'teql0\x00', 0x8}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') r3 = fcntl$dupfd(0xffffffffffffffff, 0x406, r2) ioctl$UI_SET_MSCBIT(r3, 0x40045568, 0x1e) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:44 executing program 4: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000000c0)) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x2c001, 0x0) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a00", 0x20) write$apparmor_exec(r0, &(0x7f00000002c0)=ANY=[], 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') 04:13:44 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0x0, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2}, [{0x0, 0x0, 0x4, 0x80000000, 0x34af, 0x0, 0xff, 0xffffffff}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x223) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r1, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x6f, 0x1, {0x1, [{0x14, 0x2, 0x4}]}}, 0x16) write(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:44 executing program 0: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x0, 0x0, 0x9, 0x0, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab87"}, 0xfe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) mkdir(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x101101, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:44 executing program 1: write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x223) r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r0, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x6f, 0x1, {0x1, [{0x14, 0x2, 0x4}]}}, 0x16) write(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r1) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:44 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) fsetxattr$security_ima(r0, &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="05030a0000007fff001f4cf8ecccee293e45dd9bc395f8f404e400"/41], 0x29, 0x2) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x60000007, 0x2e0854ef, 0x0, 0x0, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf8", [[]]}, 0x20a) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x20000, 0x0) socket(0x0, 0x400000000000003, 0x0) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:44 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x100000000000, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/585], 0x243) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/load\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) socketpair(0x10, 0x5, 0x204d, &(0x7f0000000140)={0xffffffffffffffff}) getsockopt$EBT_SO_GET_ENTRIES(r2, 0x0, 0x81, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r3, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r4, 0x302, 0x70bd2c, 0x25dfdbfb, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x40000) fcntl$dupfd(0xffffffffffffffff, 0x406, r3) fcntl$F_SET_FILE_RW_HINT(r3, 0x40e, &(0x7f0000000380)=0x3) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x1) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$dupfd(r3, 0x406, r1) 04:13:44 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0x0, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2}, [{0x0, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0x0, 0xffffffff}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x223) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r1, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x6f, 0x1, {0x1, [{0x14, 0x2, 0x4}]}}, 0x16) write(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:44 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x0, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}, {0x60000007, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x243) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r1) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(r0, 0x40, 0x400, 0x7) 04:13:44 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0x7ffd) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x0, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}, {0x60000007, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x243) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021000000100f000ee1000c0000000000000000", 0xffffffffffffffa3) r2 = syz_open_procfs(r1, &(0x7f0000000100)='attr/exec\x00') ioctl$TCSETS2(r2, 0x402c542b, &(0x7f0000000140)={0x1, 0x9, 0x80, 0xb4, 0x1, "59783858109e85db0971b1e339bd09358e4f48", 0xffffffffffffbc82, 0x401}) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r3) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:45 executing program 0: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="7f454c4600080023060000000000000002003e0000000000b8000000380000002a02020000f00000000000000000ef54082efcffffff0000000000000000090000000000000028000000a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab87"], 0xfe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) mkdir(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, r0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:45 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x243) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = dup3(r1, r1, 0x80000) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000000140)={'filter\x00', 0x7, 0x4, 0x470, 0x248, 0x0, 0x130, 0x388, 0x388, 0x388, 0x4, &(0x7f0000000100), {[{{@arp={@rand_addr=0x6, @local, 0x0, 0xffffffff, @empty, {[0xff, 0xff, 0xff, 0xff, 0x0, 0xff]}, @empty, {[0x0, 0xff, 0xff, 0xff]}, 0x595e, 0x8, 0x0, 0x741, 0x6, 0x7f, 'sit0\x00', 'bond0\x00', {}, {0xff}, 0x0, 0x140}, 0xf0, 0x130}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00', 0x7ff, 0x3ff, 0x400}}}, {{@uncond, 0xf0, 0x118}, @unspec=@NFQUEUE0={0x28, 'NFQUEUE\x00'}}, {{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@local, @mac=@random="4ee5c11ced89", @rand_addr=0x3b30, @remote, 0xf, 0xffffffff}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4c0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r3) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:45 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0x7ffd) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x0, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}, {0x60000007, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x243) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021000000100f000ee1000c0000000000000000", 0xffffffffffffffa3) r2 = syz_open_procfs(r1, &(0x7f0000000100)='attr/exec\x00') ioctl$TCSETS2(r2, 0x402c542b, &(0x7f0000000140)={0x1, 0x9, 0x80, 0xb4, 0x1, "59783858109e85db0971b1e339bd09358e4f48", 0xffffffffffffbc82, 0x401}) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r3) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:45 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0x0, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2}, [{0x0, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0x0, 0xffffffff}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x223) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r1, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x6f, 0x1, {0x1, [{0x14, 0x2, 0x4}]}}, 0x16) write(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:45 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0xfe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x400000, 0x2) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000001c0)={0x1}) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) mkdir(0x0, 0x0) ptrace$setopts(0x4200, r2, 0x4, 0x1) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) write(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000140)=0x2) r3 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000080)={0x2, 0x0, @empty}, &(0x7f00000000c0)=0x10, 0x800) setsockopt$inet_mtu(r3, 0x0, 0xa, &(0x7f0000000100)=0x2, 0x4) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, r4) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:45 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="7f454c4600089c23060000000000000002003e0007000000b8000000380000002a02000005000000070020000200ff01020000f00000000007000060ef54082e000000000000000001000100090000000500000009000000a3d371d99314c44da8835cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf8000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000549500"/517], 0x20a) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) socket(0x0, 0x400000000000003, 0x0) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:45 executing program 4: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="7f454c4600080023060000000000000002003e0000000000b8000000380000002a02020000f00000000000000000ef54082efcffffff0000000000000000090000000000000028000000a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab87"], 0xfe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) mkdir(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, r0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:45 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0x0, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2}, [{0x0, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0x0, 0xffffffff}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x223) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r1, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x6f, 0x1, {0x1, [{0x14, 0x2, 0x4}]}}, 0x16) write(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:45 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x0, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}, {0x60000007, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x243) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40)={0x0, 0x0}, &(0x7f00000000c0)=0xc) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') r3 = fcntl$dupfd(0xffffffffffffffff, 0x406, r2) r4 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000700)="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", 0xfb, 0xffffffffffffffff) r6 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000800)="17d464c5de9ce4de7712652126ff0922f2fbdfe4bf7113fb46211f20a85afb69ad7ac9520fad491b1456f9987bc21f968741ddc4b3912eb028f078480bc46e860bb9fb827ad17721c0982fd3751d", 0x4e, 0xfffffffffffffff8) r7 = request_key(&(0x7f0000000240)='syzkaller\x00', &(0x7f0000000880)={'syz', 0x2}, &(0x7f00000008c0)='\x00', 0xfffffffffffffffa) keyctl$dh_compute(0x17, &(0x7f0000000900)={r5, r6, r7}, &(0x7f0000000940)=""/136, 0x88, &(0x7f0000000ac0)={&(0x7f0000000a00)={'sha224\x00'}, &(0x7f0000000a40)="34f032eddc42538a1076655743f81b71efd5b93a7810d93b418e137f92bb3f83af7c4cd706ad969f0ce42aa7a8a1e2645e9dc2dc044184fac51a40e1fc9c2b917dd4d6", 0x43}) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@mcast2, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6}}, &(0x7f0000000200)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000600)={{{@in=@empty, @in6=@local, 0x4e22, 0xb7cf, 0x4e24, 0x7, 0x2, 0x80, 0x20, 0x2c, r8, r1}, {0x81, 0x1, 0x4, 0xfffffffffffffff9, 0x101, 0x2, 0x1ff, 0x80}, {0x0, 0x0, 0x9, 0x200}, 0xc4f47eb, 0x6e6bb4, 0x0, 0x1, 0x3, 0x1}, {{@in=@multicast1, 0x4d6, 0x2b}, 0x0, @in=@dev={0xac, 0x14, 0x14, 0x27}, 0x3500, 0x0, 0x0, 0xdbe, 0xdc70, 0x101, 0x100000000}}, 0xe8) 04:13:45 executing program 4: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r0, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x6f, 0x1, {0x1, [{0x14, 0x2, 0x4}]}}, 0x16) write(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r1) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:45 executing program 0: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0xfe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) mkdir(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, r0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:45 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0x7ffd) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x0, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}, {0x60000007, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x243) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021000000100f000ee1000c0000000000000000", 0xffffffffffffffa3) r2 = syz_open_procfs(r1, &(0x7f0000000100)='attr/exec\x00') ioctl$TCSETS2(r2, 0x402c542b, &(0x7f0000000140)={0x1, 0x9, 0x80, 0xb4, 0x1, "59783858109e85db0971b1e339bd09358e4f48", 0xffffffffffffbc82, 0x401}) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r3) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:45 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000580)=ANY=[@ANYBLOB="7f454c4600089c23060000000000000002003e0007000000b8000000380000002a02000005000000070020000209ff01020000f00000000007000060ef54082e000000000000000001000100090000000500000009000000a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b705004bdf5479b018ae411fe381f162c83d3572089390fbee99aeed5527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf80000e2ffffffffffffff0000fe7bb285e69ae9750000000000000000000000000000000000000000000000000000000000000000810000a7643cdb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ba000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000db2a7bb3f58d90f360cd276d2c19dc759712d5e49d279b8c909d3161cbfe6f52ccc66511eb4ec1f56cbc9f4d9df56440b3ce3bc3d241cf2c59cbdd006d5d163cd09ceecd9b592b012a12a4712b5dc31a11b97f2400c37bc4db4ce234c6efac95da0278ecac612b1dc80b29ec13f54d584717a73d7a5c617a1ab5408100a8226a06c73822a5057c1de619b1da6f66500229c3c9898a7e14bad9095cb5171c71777a96b22452457e160ad112ac3679f569834041636c8df23effbbfba7d3ebc1d06fe207322f1d1ca2f73419df525043a79ddc34"], 0x20a) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) socket(0x0, 0x400000000000003, 0x0) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:45 executing program 4: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r0, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x6f, 0x1, {0x1, [{0x14, 0x2, 0x4}]}}, 0x16) write(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r1) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:45 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="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"/517], 0x20a) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) socket(0x0, 0x400000000000003, 0x0) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:45 executing program 0: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c4600080023060000000000000002003e0000000000b8000000380000002a02000005000000070020000200ff01020000f00000000000000000ef54082efcffffff0000000000000000090000000000000009000000a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebe50009342f2cb607adac29405f6980720531dc23a2a861c11f3e24eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b042b08dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf07688e12ddc26842295399491c80d630fce543cfcc5d64f2f8cd6bed0747a52c968a42a1bfedbcba6121044d0350e1b90"], 0xfe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) mkdir(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$BLKDISCARD(r0, 0x1277, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:45 executing program 4: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r0, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x6f, 0x1, {0x1, [{0x14, 0x2, 0x4}]}}, 0x16) write(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r1) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:45 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0x0, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2}, [{0x0, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x223) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r1, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x6f, 0x1, {0x1, [{0x14, 0x2, 0x4}]}}, 0x16) write(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:45 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x60000007, 0x2e0854ef, 0x0, 0x0, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf8", [[]]}, 0x20a) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) r7 = socket(0x0, 0x400000000000003, 0x0) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) sendmsg$netlink(r6, &(0x7f0000000200)={&(0x7f00000000c0)=@proc={0x10, 0x0, 0x25dfdbfe}, 0xc, &(0x7f00000020c0)=[{&(0x7f00000004c0)={0x498, 0x34, 0x100, 0x70bd27, 0x25dfdbfc, "", [@generic="86324927cdb652f07cb0fc92335fd504aa824f15d4ea8da2740a6c712dc9c5833a939f2048452abcefd5a7413a7e50ee9783b6e3d9b82a", @nested={0x12c, 0x44, [@typed={0x5c, 0xa, @binary="1c8f6f0e22cbe7736c1164295d1f375f892c11648424c916e8517f63b60ffa8b2b31b3f225ee81a7a5f785f35dfa0d3a0f8fa74547e751a6dd6475fe7d519eb2cdcd24e4bfca13e5fdccace84f51fa1a1651fb2277"}, @typed={0x4, 0x60}, @typed={0x8, 0x33, @u32=0x3ff}, @generic="0cee9f450e886451b6c822cec62380367daf6fd190e414e35490b2f518b4812b2056d80928c7d74cee0a1cd5a5e3ea769fc54b0bf2866ced713e78c5c2517a8b20e99dc91e9bf9ca1234aeb91ee7380c15ede334e4dc0a486eb972e82d1bf863f11fc45235d2d1ef7b2fb06025b44aef0998c95655216cf46a1eb798f78255e79290fc73bcab36d154d93ef9de7668985ac6091e417779747ebff291f13e43ea2bc93923f5f917de3dc1ed7831f0dfad2cd58eb59d44dbc39e61987dffa72105"]}, @nested={0xbc, 0x66, [@typed={0xc, 0x49, @str='fd/3\x00'}, @typed={0x88, 0x5e, @binary="4539e4c8257ecd540aba57c15339f7009f958017db93a288cd6803a2b2a063ad0aed90507b2027fea21eac02b14e23787c92840e4360f98ab3e39f36068768adcc8c7488182ec2a7e0f59cb691b50ea1d17bb389ece10f46287c3519b9b462b453ee3045ccea037b0f8a72f9ca6ff5a3295bffd10827add644a25640e5a603ad0a"}, @typed={0x14, 0x42, @ipv6=@rand_addr="d2c5805f7273f3ea17d196375d3813fb"}, @typed={0x8, 0x8a, @uid=r4}, @typed={0x8, 0x6, @ipv4=@multicast2}]}, @nested={0xc, 0x6e, [@typed={0x8, 0x33, @u32=0x80}]}, @nested={0x25c, 0x75, [@generic="11ef30e4fb0be48c546dd44e6240b17bc5c12c5bd5f906af2d6ff2bb6a382df11c00246c32a5cb8bee2ab545ca19694c2dac51d989a82a74421ae0ed659d7b2468ac68685af65998c8f42fd36593899c8c943648011485f8af59bc9158946b60cd386172b95e76db52966d032b6c2778e0717254c51612f8db10b3078cd8853bcfa46cbc0e5e752007644cf1e8aa946b9b0d9b55ad1babad7b89", @typed={0xf4, 0xe, @binary="cfa50bc6d6776356727f9b9210deb89ee028e5c94071af289e8a88394a3fd922ed6cdc41238a9a888b196affce6057bf1b9fe06551c106193c12828e5c129a2d263386518c33344fc820241daebc2f59b31d3fff06052cf5e2ded4109f68c45d63887443372c66e9a34cf0335c254e1ac37c83d6c2bce1f23d253870f7fdb0ae37ff8da4d78a1631424b33937a98eaf2985d7d2c6ea07193538c4227c42f174b95a3a633f98e1a3a2c30c1ad872c07bb8ed6976f1535079069b24531865596869ac815e33eb9ce6105d0102a092be924aa4c7407f0784aacb1615ca896f0211a21cd509c63ecff8c771bbbe67fff5e97"}, @typed={0xc, 0x32, @u64}, @generic="c9597e3acddd4fd9276d4627c51d49a4b34441cc5edf1023fef423aa3fa0607fd6c59b5af57f50fa193e11252c4e204b69a2f5fad7ec4edc794aafcbb864d3cfa511da30c0b7aa429712549684c07172c88ac6363236e25a761c1f81bcea6226c8dc848dd9cbad545451c7fbb7395b94c0c0883efa6b74611cae6419dec82838d753b9bdf25a2a572f8880f8f0752a16a253b4c33a70027183f0a8551ada1f037c6b1f6744befc31915abb70f2e13f9a248fe28f4a6810d53e20f19183"]}]}, 0x498}, {&(0x7f0000000980)={0x1c8, 0x3f, 0x208, 0x70bd26, 0x25dfdbfb, "", [@nested={0xa0, 0x82, [@generic="4c8f63e7318ac88a7bb1dfc7244fd9f6b730f3d3537e7c80de32411632358bd102a36d231510926249afa760cfb9e0249324f64ab144f8ca0788036f66787055b3595be678a3e7cd048bc9bdaacd348bc44052ceeee7e38181b97786e60478d40f814b2f9193071e4c937a7a777755748f167d8e613e9988a962f5082cfd3a5bcb8b0c921cf53c026938dd8e9c07d5d926c87101e412d883f6"]}, @typed={0x14, 0x4b, @ipv6=@loopback}, @generic="963dd9bee493931d9b5e9cf3", @generic="8a382396a09f6585748e3d437b72259439a1db06a2f923354f45c80e67c70ff6340c5dc5717d17df9dfb67cbb90629a06bb2df449e6b6f3d0b869cc36c0f91b5da344786b54bce812e6a132dc4e5c9be4de4403c07d2de996c2eef3596e1bfa503b6ac728c4f505695848ec863e988850de99077739d88cb116bcab85062cfdef3671ac0d169faa204cee098fd3b298fa57c68e5ab06579a8a7781a9f74a64a273452046b03ca92ccbb7a365fce4db3c7a3603b66410a2812492d9dac9695f7157f87401c1a23c949f18435bbe5bbf1eaaaca75618b36c9e9adba150a7ed12748dfc8377eeb4c855f524906a67fcbbff276070d77be63529"]}, 0x1c8}, {&(0x7f0000000b80)={0x4ec, 0x18, 0x200, 0x70bd2b, 0x6, "", [@generic="094bf0428ef62dce9db05c90e3058996a6c27b6a95290b2a8a5bdf08d6d2ba8576f983cac2e268c5975be4672128f077304a02b84cb7372f0b66a8a132e77e4d2c2988bb7f759bf777c4c0d906527f18262c28b5d8f4cc641ed28841dd68d2342162fe3f191804e900f9d667473402bfef0bc1d94689ebf568a6cc58b56657c24af5bb439f5c76942e27f0e719db69db8213ef1e2524e86aff169fe3fbab76b97a615c1aac781ae8999b7483c700fdf0d9fbc1ba079fd4d07a836028c30e8e0d0253892533af17", @typed={0x8, 0x21, @uid=r4}, @typed={0x14, 0x6e, @ipv6=@dev={0xfe, 0x80, [], 0x11}}, @nested={0x2d0, 0x40, [@generic="dde31b0cf249a1c49bc73dd9b76cb35bb71a72a7e936bd464d5a7a6b84c9d5738a835854076da97f4671f8614488effbfac2d0ef0f5f013b051a089ca14d592a7980c5bd1ccf5f29d43adbe357d69490da37df7563f172c16329968617941aac1305a115ba47271c6035129e664a7cfd6f83a8a921d85ec1cdb11e5eb66f583e045d040aa11251a4e6f621cd3f37c3ead5366be32b3d8c09439f84db634972c8931ed74e714b9b2716a5ca", @generic="bb55ab2472c30e6041006e45ab24ebb77064ace04e80505fc0b8ef29d5c7713ecb1c882e085c0cc93792f8068e195b1d132bad39d39d2e", @generic="48259a5f777dcce8b40abd9b7443348b5a7384973c076001839c13a08221caf8cc7cf3028b4b03394af52776cb4e09bf6f476f93f26ad851f693bcc34fd64832d34addf25a39922b68af13c2bb0328a8a6a6e1cfdc2bbd1940674caae37cc434a9544857caf6b6ac2e09e4ae2047e27e04b8ea1a987932e478758ef83d6d3c6203f11fc354b545773df70a2aac6109a286f55e1ec8f0a65b064656632f98d1e18c909386234dcb3ca52685f482d25c535c33ad58fc4a9d6c8c071eea30586714c4c3151fd3da0e32a1997156679877c3ddef9a97fdcf0a4397898c44f82fc24040875db00decb147ccf414514040", @generic="35b2c1bdd9e597753d95601f57bff2d5986205ad89450412c7143d79b1e51c0c6d4a82ca76946cccafb53454efa490a506eb9e7fd5a2d5844b9c10915c1d8bb3d31cc8d305ce63620e04b583cea192e5a3f68650838e9aa3eaca448b9aab29acec111e141621e5459e26721c0ae36429877ed88d5b8bc753062104166af248b4ab1ef11e70a193904916d7f7c10c7d464191", @typed={0x8, 0x32, @uid=r4}, @generic="28cffa964b119755e04f147e56a3a6b8eca01ed73666c230d3d7fb942d35d37c7845bc6be3a2c4e1fb", @generic="16042f90db78a36b7c81dba219ca3e5b492db4ee87213743ae2c9e8eb5d7f8f08d01e179cd7ac73f32ae1c56f08ff15fe5141f662ab6a4d0"]}, @nested={0x118, 0x1d, [@typed={0x8, 0x56, @ipv4=@empty}, @typed={0x8, 0x36, @u32=0x148}, @generic="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", @typed={0x8, 0x54, @fd=r1}]}, @nested={0x10, 0x16, [@typed={0x8, 0x13, @fd=r6}, @generic='9']}]}, 0x4ec}, {&(0x7f0000001080)={0x2f0, 0x1f, 0x200, 0x70bd2d, 0x25dfdbff, "", [@generic="fb796adbea68c103e8b401a9fcd5956199c915ff304dcc85a6368f8a5ae23b44c34c9e9082c3e25b00773900436c1691e170", @nested={0x4, 0x36}, @nested={0x2a8, 0x15, [@generic="fa40b648ff3a07faa1d974e6b985cdff059a30a5817512f824270e74cfdc8e5a2c2533296f9883d4cf19284b350b69cd1db9f0657810c5f623a6417b1adafa534d733e0baa93b5a1a2c29a1802acc70cc9605b645405b06df745bb23fab60fde27f3abf68465921bc534124ebab986da30603bbfcd886283f174799a2a3c90170e91bb3e6da6f332cffe7f10d52d35287e8a3721c0df0cd3d6d1", @typed={0x8, 0x5a, @str='\x00'}, @typed={0xc, 0x5, @u64=0x6}, @generic="80889f122c4b5b465942da2ca60578b4e86935c7403f8fa6c1c88a2dc28bab196e3c1582f9986c6796839bcb70de0bf86acb257b6cb88c709aa28fcbd179b527ed", @typed={0x24, 0x56, @binary="d1621777659feaff10612dd9db0de18ab6d6ceb73e4016f390eef020bf6f5566"}, @generic="9d6b4136c6a736fcd42d2fafcbeb69908bdbcd9579e79394c1d6f5722d13b9a770b1469d114772e85c17ff2739981fcb2eec77fa0be329775d0bcfe0cb1d9d486fb46c69c5aef4ed3c0a56c81ae00b305d2d1067ecf898f178fe46e644af817f0154c3b72ec383dbedcc49a89e056bfcc41ff95cbef84f8b5c9eaeb8279aed97cca57c4d873d10a328b6d050d7506effae465d148efa61064e7589ab0c42bd99079bc208498554b071674696d9c87c67f14304026ef5ec06e708ed6125dd21341fec978d3bed39e5f5da6a6248642f39fc8e645e21fcab06ed8ea95eaac7d11443da341ac15ebd9289e986d6635669f63e43ef0628", @generic="285346e8ccf278dab66c3fea13c9264f8ae9d56e85b3995a9cd4facb90a8e37ac021ccc0318fcdc4900315ced8e5fe25753257a47eb21fb435ddf5f664a4ad91a3993d07c234d8d5132d277ff4acbd9d5e16919de0d1b7ceeef0297e62ead602620be6e52247053f59ccc6933cbb11c03cae0aafb4616971e4796589ae5269c55607a644fbeb79a9076fb3aefd60bbeaa35f4a76", @typed={0x8, 0x25, @ipv4=@local}]}]}, 0x2f0}, {&(0x7f0000001380)={0x3a0, 0x3b, 0x120, 0x70bd2a, 0x25dfdbfb, "", [@nested={0x264, 0x22, [@generic="eaf8343df46b16bd35228aa4685956e0cba36112bee05f532ae6fc88f4d334c92e264208c53b8636af494c68a4a856c463d32cedaa18d9e22c6003095be1aa27ad24ce68ecd53aea1bd0168e7d23f325a8556d0c6192b7206c703af692a452", @generic="46fd606fea5bc35c8b030883eb7deaa0e429079e52e4a97775e0c99719d4c8f4", @generic="866db07bc8bd9802901354441a0fe39cdd5dcd6bf769b5c654392f26f02698e6ab3091bbb2d08cd7911b26623f7bcf50d396322037c36e09da232b1776d0203ac6dd552fe0dc1bb6a7967f69be9227d818f673401693633a6afd688a70dbaf6cc0d51deb87c0392fa147069a98e8c745a7729cf073c007bda44d1d8c53e81016e79a954342dc19e41e589fbba8f084c8510ac4765dbd773b35fed22e52e171b5e7962fa402376a87a31991ddbc21a40f13b010e1bc8c0a02ab4419cdac58809e1b801f7906297f714d25ae291b1abb6fd4", @typed={0x8, 0x22, @u32=0x1}, @generic="83b5d46a2f8f32b764c11cf2034efd94b96e235d184c5d2097acfea2bc9087d8bb", @typed={0x8, 0x33, @uid=r4}, @typed={0x8, 0x62, @uid=r4}, @generic="2934fbb7980913a7ccfd52ec419e50689530f53b2479f4c505eed69fe9e3223eb718227b1b7db2de601b5df114b5f0cad5bdfe5d6a4fc5362e871020e74a31285a27e6ec5bb2b2cfcbbc020ecec679896e0d9ad654f98882557c4ba4d52979a21eb2a7", @typed={0x8, 0x68, @pid=r3}, @generic="b0543a3b4eb8c13856a9ffe9d1643c7c09020fd2017b847ed7c6820d105018641de02067fa2f035c80683e59e7534eeab623f527ee83b818ac10a75e590e268691134bd6e51791197dda2e14f6018751aa97087f3dc93d635860dda7c9e22d8a84addd06d6c7066e10c1f4c4"]}, @generic="9573b438be1729c08030872daa598d2195e5f584b0d6385966dea5a7ad6344c8ea4733a376e73ea7626ac85442b4f979fe028f59ddef4a213ce57fd0d9642c1747aaaf664c7fb27a3b13800d2841ed041f8fdce31a891746031e19d80e40072d23039a7f7ad5ae9f6b5881170d85425de361876ed39aa55894afd04c15a5a4cd1fb476b30f12de039ccd3528785be018b3c21e21b65ae5fd596cf7c9e0e1e1c464e0f16bce9e8823bea0e01ada993e251199f58acf0c311dcb85", @generic="d555f78b000d54e06eb7d350790dbb266afd3ae97ffa66d241d3a211b768b897e2225f304b0770084e214c8febab2c0f85abe81e814f9940eac56d57f5361dff4cd8f6de9b65696a10d9734a87dd6d4d4538c53bb4edba623e8977e62f59a34765c961ffbd313632e89a", @typed={0x8, 0x3, @str='}\\)\x00'}]}, 0x3a0}, {&(0x7f0000000100)={0x40, 0x14, 0x302, 0x70bd2b, 0x25dfdbfc, "", [@generic="9e50fdd043565e70bb44732ef3563f8b2b7de412c89f5438b01698e929e1b373b071ea", @typed={0xc, 0x5c, @str='fd/3\x00'}]}, 0x40}, {&(0x7f0000000180)={0x7c, 0x34, 0x70d, 0x70bd28, 0x25dfdbfd, "", [@typed={0x8, 0x8, @uid=r4}, @nested={0xc, 0x61, [@typed={0x8, 0x7d, @pid=r3}]}, @generic="1c0522c244518f10858642bec10f59a239eb94fe74c228f22190219bbc6e44441d77442d4f653c13bfbbcc63991435f4", @typed={0x14, 0x60, @ipv6=@mcast1}, @typed={0x14, 0x45, @ipv6=@initdev={0xfe, 0x88, [], 0x1, 0x0}}]}, 0x7c}, {&(0x7f0000001740)={0x958, 0x30, 0x400, 0x70bd29, 0x25dfdbfb, "", [@typed={0x18, 0x12, @str='vboxnet1vboxnet0\x00'}, @typed={0xe0, 0x9, @binary="fad7a964afe8fe0bd4000d5d7627fab6736924477c91f396eda98f97ebb93a9063fb9327f36c947e6f9da6e1158274d7954f6c702f3cc118f230fb2e4e55b23a994eb24eceecef79953b5dca1b8d6b6ae602b83c09fffe9453b7ea2f6e783c6f9dfeed1a6a5b2535ed58317c8cc3bc5bc4070e8327272b99a44191f42c484c0f9379255d2c27e6e603a408b56f01f154e147e5cef98354c62e3c99d3c1e7ab5f2eccd939c9b67ce2198347f03d20139c3a1b6d64ae026eeca153da7ca276c57c557c8808588caf6e9b1fb6bc9afa8412563c96089fff702f2b"}, @nested={0x9c, 0x2a, [@generic="58f6c22b4941dd318ddbd2aeb98bfe86ae9e86fe3d71691d0eba635dd5d2064480b9fd949e96effe098ac194ad12554172e95f2a9c426a411073978a37fd604b1b64cba5f1062aa6b7b8cb6b921384709863fa905a45017b3fa902eb0a", @generic="ad708d8e18d9017879518b961ff5a52c5dabbe096951215b1896e8cb1481", @typed={0x8, 0x13, @ipv4=@multicast1}, @typed={0xc, 0x81, @u64=0x6}, @typed={0x8, 0x7c, @ipv4=@multicast1}]}, @nested={0x254, 0x9, [@generic="7c1a16aabcfba15f13446db2f863b58151c953794a8aa15eeb03f5b4866412e9fd3046765c95f889d23ca622755f67d04acf65e2bd04a7fbb059a45a3cb9245eae72b2ecaec642203d42d3669538428b946ea3ee53c81bb9b70111a330f493e8a1864627685c0099fdf075e6e3ad3ec4bd033e1a21bad01432b7a05afff9c9ddfd7d0f89e391aaf80724d43b48015575e8f2d63bd2e20f", @typed={0xc, 0x95, @u64=0x7}, @typed={0x4, 0x29}, @typed={0x8, 0x7f, @uid=r4}, @typed={0x4, 0x8}, @generic="dea43732abcb67df781b118c000c129012cff425583a838ccd4bb24fe875b0ff47738ed6336a69d886feee6ea8bb695406f930c9a08be0505f7686f1d12d2df7e4641012557374d7880dcafa4625ee0262b315a4813da8b802decd8901e2cff1c0371feb8978f2e859b4e49644b4a59c869369ef11f6d6ea4cf30b44d3c9b769e10a44b116bba21dc833741f8ab9358fbc9651c2ab3cc115b0c618e5cdebddfaab0fcbba098e18a57d1336380ce24b91afacb05f571897c3309590883429625886784c999dc5467d8b2e0a5e616a43", @generic="a4131dab35fb7775d4c123662c75bb904e8499016ec6edb8763a3ab797e0c00273395d1aa3afa8a7140371dec0c93a20dfb40d4abbafe5b6e31307d6475010508e975c470ed120888fa916380a73db2d34bfcb4940ad3284037dbb7a883470e0d788668eb06a53c5a8f15ab27d1e73b469be57b965e2c8d8c81187f122d224420fcf1bbfc49533a1a4b2c55aa7c9609a62c0902251b8daeecbaf110ebdae0027cee3734c7c7d00320d328f697eddb45e03faa213019a37a4768622fcc12c005d255b5cd2b744", @typed={0x8, 0x8b, @fd=r1}]}, @nested={0xac, 0x93, [@generic="3f11316523112e504fdc5a8142b361fa7c1541151c3ebfe0ef35e271e287b634eafe854b8c889ec971dec5f6a3867395344802717451b42e77e664545bbf5e5c1695ac015e6e5feba9eb211e64d5a47e05b1547ed473c3db5fb45d70d889a7389eef3ef1db65a8ecdbb74e4fd89dc6f94264d22f2a1e50acc0455f1b9642cb9d9cebedb3066b489b11018a9db5dc0a233eb4baac1949c4f3d9b0df1da81d442a2d16e3179f123b1a"]}, @nested={0x2fc, 0x22, [@generic="829e3db1442da4bed8ebba9955c0bafa13ae1e038d3eb324c20e04228ffe014edd24027befa1b6eef8bd85d7e527a38583636111bd9548b44ff4a69011707aced0aa3f5248d5be07bf857e9e25b1e2e1e4adc9424124ccf0694510270394c98a244e7cc513e69391ff1ec846cbea8e0c18ff6932ca24c3fe9adac392fbe601ba286954bb12e8fb97fa855f1cc457df84c3862418cc1444d1424f", @generic="172024c5a6db819523b5ce6cb0148255dd5dcaeb420509546494ddc0c85e02f3d13bb4846e6794b34a", @typed={0xc, 0x35, @u64=0xd4}, @generic="9151d31a2135ed5c79f323bfd64cb8217e76de7d5c9cce5d5cc2f0d8f64a8f9fe6e23d24de3a609ec785c91e2e53c78ed2d15105f3d103a953bfc641ee44dcc94cc6e8cd158b043bc0e1a3070af92eacf67ee5f9176590fe4878c824e0fc696b17313941a37f5deb652b3ad9cf1d39d72218e9a0e08b399366dde1f6fa9b19ae89e51901e64204339d88b70d", @typed={0x8, 0x28, @uid=r4}, @generic="10ddd2274ac68ca10db3360ea95147c0c0c6db21b75742d3716de63033f4b97db3e5966d7c6893d44b27fabfe3daaf99223233af0f3b488648d6d52cd1727d36101f110fff6a1f72e72a02e6f9894705c0487f93edf25786410c0d3005910f33c419aa6d98b30fd1845aded00b0bd239064befaeeaafce374bcbd9deccaaf76a1df723f4e42eb11ba3d01f9d508d54bb67298e1adb141d2b3c046f71a5d57da39f2c98ca9369c6002dc7a46c86874e5f730b176484b9023e0aa6097db5089597e48900a224add112a9480c6ca1d5bf1911885c5b66578697fdfda04686ca169ffad799745d5c7b0ed8d018220f9bb9740468223ad9bce155b351a115f5", @typed={0xc, 0x0, @u64=0x9}, @generic="346fba95b4b74fed4b0f056ec4f4a3f20597b46757ed923226137db1bf2e05f1fb78023284bb1f5e4a7882156a3ce4afcb19df325a3643d8c56dd5c59be81365047d54d966ddf98e763771505dcc0bbc88e1e084da7b79eeac7ff095c81f1900290ab924356ec57838d357a972abe44fdd15880d1b18c60ad393de274d6f028178631a327978d241f8"]}, @nested={0xcc, 0x73, [@typed={0xa0, 0x5e, @binary="a39822bce2f60fdb788f03d7f47ace2acf5bc9da6a32daf0c4df3185b9a65fb8fecac85302c1b6155a677efec07c2f6e6b39e562eb645f00f4c5813aa1b7245e82c7be74d992a472cb299e672e5f256298965910537882c0cb51ef4f64c01c1695f5a820eff0c2ef689834ed9c87352eb3d1411e4df29f86eccef65bcf4b377431a89ec4c02bdcbacd50f8ce1d6cb9795b92b629a00baa01e84b"}, @typed={0x8, 0x86, @fd=r6}, @typed={0x4, 0x71}, @typed={0x8, 0x8, @uid=r4}, @typed={0x14, 0x72, @ipv6=@local}]}, @generic="c5fc13d27eddf04f91b2d7594d83fa5269558594e9ff47bbbc2b540f911b69b3531ee280b789822c4179e3f1b3dfc75f8fd4fc49ea2b5d03591973429d0aaea7d49db4cc16bb2885e628b7e6c5fe2909a067d5ada33926e072c9e154f1f22a91dd97734a6cdfae394e4badb0db20008d098972b7a6cc898e0fa19557cdf429cef36d93f17d32d10a95bc082d2e8ded06041de05fb3eb8ed72fd5a952a3cbc32012aab1b586d44bf00abce1bfaf317d3a1f7216de660428e247354de166483515772e68da6026b45341ad54492b458a927da251e2150f13", @nested={0x14, 0x92, [@typed={0x8, 0x1a, @uid=r4}, @typed={0x8, 0x17, @uid=r4}]}, @generic]}, 0x958}], 0x8, &(0x7f0000002140)=[@rights={{0x30, 0x1, 0x1, [r7, r7, r0, r1, r6, r7, r0, r1]}}, @rights={{0x1c, 0x1, 0x1, [r0, r6, r1]}}, @rights={{0x14, 0x1, 0x1, [r1]}}, @cred={{0x1c, 0x1, 0x2, {r3, r4, r5}}}, @rights={{0x18, 0x1, 0x1, [r7, r7]}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @cred={{0x1c, 0x1, 0x2, {r3, r4, r5}}}, @cred={{0x1c, 0x1, 0x2, {r3, r4, r5}}}, @cred={{0x1c, 0x1, 0x2, {r3, r4, r5}}}, @cred={{0x1c, 0x1, 0x2, {r2, r4, r5}}}], 0x138, 0x4000010}, 0x1) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) restart_syscall() openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:45 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x0, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}, {0x60000007, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x243) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f0000000100)="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") getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:45 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="7f454c4600089c23060000000000000002003e0007000000b8000000380000002a02000005000000070020000200ff01020000f00000000007000060ef54082e000000000000000001000100090000000500000009000000a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000"/522], 0x20a) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) socket(0x0, 0x400000000000003, 0x0) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:45 executing program 0: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x0, 0x0, 0x9, 0x0, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab87"}, 0xfe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) mkdir(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, r0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) 04:13:45 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0x0, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2}, [{0x0, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x223) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r1, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x6f, 0x1, {0x1, [{0x14, 0x2, 0x4}]}}, 0x16) write(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:45 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/687], 0x20a) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x282, 0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) r4 = socket(0x0, 0x400000000000003, 0x0) accept(r3, &(0x7f00000000c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000004c0)=0x80) recvfrom(r4, &(0x7f0000000180)=""/136, 0x88, 0x1, &(0x7f0000000500)=@xdp={0x2c, 0x7, r5, 0x13}, 0x80) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0xc00800a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r6, 0x0, 0x70bd2b, 0x25dfdbfb, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x840) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') mount$bpf(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='bpf\x00', 0x6020, &(0x7f0000000600)={[{@mode={'mode', 0x3d, 0x3}}, {@mode={'mode', 0x3d, 0x3}}, {@mode={'mode', 0x3d, 0x103}}, {@mode={'mode', 0x3d, 0x100000000}}, {@mode={'mode', 0x3d, 0xffffffff}}, {@mode={'mode', 0x3d, 0x100000000}}, {@mode={'mode', 0x3d, 0x9}}], [{@uid_lt={'uid<', r2}}, {@fowner_lt={'fowner<', r2}}, {@measure='measure'}, {@dont_appraise='dont_appraise'}]}) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:45 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x0, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}, {0x60000007, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x243) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x44101000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r3 = fcntl$dupfd(r0, 0x406, r2) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) mkdir(0x0, 0x0) r4 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000180)={'filter\x00'}, &(0x7f0000000200)=0x44) r5 = getpgid(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@initdev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) fstat(r4, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r8 = fcntl$getown(r0, 0x9) stat(&(0x7f0000001080)='./file0\x00', &(0x7f0000001240)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000010c0)='./file0\x00', &(0x7f00000012c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000001340)={0x0}, &(0x7f0000001380)=0xc) fstat(r4, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, &(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f00000014c0)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000001500)={{{@in6=@mcast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@mcast1}}, &(0x7f0000001600)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000001640)={0x0, 0x0, 0x0}, &(0x7f0000001680)=0xc) r17 = getpgid(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f00000016c0)={{{@in6=@initdev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f00000017c0)=0xe8) r19 = getgid() r20 = fcntl$getown(r1, 0x9) fstat(r3, &(0x7f0000001800)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001880)='./file0\x00', &(0x7f00000018c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000001940)=0x0) getresuid(&(0x7f0000001980), &(0x7f00000019c0)=0x0, &(0x7f0000001a00)) r25 = getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003240)={0x0, r3, 0x0, 0x1e, &(0x7f0000003200)='/selinux/commit_pending_bools\x00'}, 0x30) r27 = geteuid() stat(&(0x7f0000003280)='./file0\x00', &(0x7f00000032c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000003340)=0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000003380)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000003480)=0xe8) getgroups(0x5, &(0x7f00000034c0)=[0xee00, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0]) r32 = getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000005c40)={{{@in=@multicast2, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@empty}}, &(0x7f0000005d40)=0xe8) getgroups(0x2, &(0x7f0000005d80)=[0xee00, 0x0]) r35 = getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000005dc0)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}}}, &(0x7f0000005ec0)=0xe8) getresgid(&(0x7f0000005f00)=0x0, &(0x7f0000005f40), &(0x7f0000005f80)) sendmmsg$unix(r2, &(0x7f00000060c0)=[{&(0x7f0000000540)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f00000006c0)=[{&(0x7f00000005c0)="dc3d49fb4f948310f887a3f7e37b86c482e80f54c6b4bf9521798db41aea32d3d6ee34c962d7c4f6e85d3d4747bb91fda4d0f10e96a9c12384eb28483e117f0dd37f878f26c85279a96454dc1cc8ecf6ef36a456c9c07358c0c189498bf5431ce794beca0acaffb4d9a50057a013717d692851c93a6df5d1d1ea323823bfb0db922a20e5488b5d94d7403841b210cbd1a5a285d8737efb91e2ab486e5714bc739f6398408b380fd2fec1ea257ad9d8f8aabe335679593bff8e20cdbd4b1887fd9fa13ef05fceef9ec59d9e09a90c7070ddbbc18f04b3e409de690cbe5584091e00ebaa182b5a4261eff6e28614", 0xed}], 0x1, &(0x7f00000008c0)=[@cred={{0x1c, 0x1, 0x2, {r5, r6, r7}}}, @rights={{0x18, 0x1, 0x1, [r3, r4]}}], 0x38}, {&(0x7f0000000900)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000000ec0)=[{&(0x7f0000000980)="51a0cc727d169b202a4ed0c3161f8fbcef62fbe0afa08f6a2d57d017d835b6f3d784170c8b920597630263474b5c3b98b96dbe84b813a1d58db3e6bcf01eb8c3770bb5e53812ca5450dcd811db83e17e3ca677c38647f331ef293abadd32cd39837d977c", 0x64}, {&(0x7f0000000a00)="6d4ebb925d8838989770d26ff7c43cb9f3017b4faede5f6a4e8efaa0486fb6c05136cba5cb2f8c31ef20fad2ed49384f8d3a86441b9470b3ec60800adcbf2292521b1bab0f59b6a5f7182038e972fa2ebf015077d74a6bbf83d23774cf403c1e8f32757a3d4f5156389d203c6a14226971a0a3fae9fb24dc3273058b931f1c2c2060b03a4f9e221691dbc27bd13fa23498875702988f1b190cb97722adfa410bb5c20c50d77dc79f2be58aad248aff7c360e078c19bf66b413cce7e99fd7921c162fb040df6c9ee97589f9fda4c0a57d386a3af19711ad33008f", 0xda}, {&(0x7f0000000b00)="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", 0xfc}, {&(0x7f0000000c00)="fa76d6227155", 0x6}, {&(0x7f0000000c40)="d9533384cfd389ee247fc6d194717f2f3105ec191ab36e73f3c9984f9832e871802fbe3b96f4c6b96c2f0d3e36f8f63813c69acac5a950ca", 0x38}, {&(0x7f0000000c80)="4c20ed7d9bac632bbc040bce3083f039dcde562694bf2fdd446bd5451de64be8c54d05dad04992f65334fbbac052222d38449a9a06fbc141722b15bee5452684840b5818077be77b5f873a0ea55ec7dfd582075aed0b971254f523a9c7f74ddd8b71329d46445f9e3f40aa510613c24b69602699f32c2cec3841462e2ebae4c7bc51ea6ff59c0dc295792ab42a588614253402a0910757864ae1a0c3b2c9b75d6da7e272c5e4e52a7791526092139158c14f7c3ce378d6a64cb8b4c356ce807201632d76666a99fe6b2f0511469dab6ea9c95703a654f25fecfcf181", 0xdc}, {&(0x7f0000000d80)="3489dde549fdf7d131d1a4c7d7f8737000a656254ba7d734428a2280939e4c88453cee77d762d7fd3b24c3c24e1070", 0x2f}, {&(0x7f0000000dc0)="8611858f49e063ba5fce079b3052230c0e622ef11c87a9c44061b374950a954aeaa8667ad295c6ef3a3fc65a6362025417a478aaadee02d3b66a36842a2d440fb95ba840997f7f", 0x47}, {&(0x7f0000000e40)}, {&(0x7f0000000e80)="aef2503f26a8d207d8f7", 0xa}], 0xa, &(0x7f0000000f80)=[@rights={{0x18, 0x1, 0x1, [r2, r4]}}], 0x18, 0x80}, {&(0x7f0000000fc0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001040)=[{&(0x7f0000001140)="697a6d997a45f0348d77cf2ebfd98bc28cad5a4dc2172b8dccd244adcd55cd5208ab38e14f3e1e5de93fbe9ba075032c02db4e2dd44f416b3a3fad38b4e35097e29e264c15cb6fb6b1620012de30e7f2f136e763699ac08ff87110f39ba9cc9c8be06d7e19526a619cbd5378d9efd04247c722b800e0941b82f93e79461bb0e76bba5a32e8f1ed3b3864b5bf5acf676ac564c9bdc4e692a158b29d4a5fe27c65328ee9bc2c1af723b77e8d9160f608a1c477afd4a63d2d5a2e7dd21ae6aa90d05de300f9328971a0394c0edd8c7148b9c77c0634e94f067964fc", 0xda}], 0x1, &(0x7f0000001a40)=[@cred={{0x1c, 0x1, 0x2, {r8, r9, r10}}}, @cred={{0x1c, 0x1, 0x2, {r11, r12, r13}}}, @rights={{0x14, 0x1, 0x1, [r4]}}, @cred={{0x1c, 0x1, 0x2, {r14, r15, r16}}}, @rights={{0x1c, 0x1, 0x1, [r2, r0, r3]}}, @cred={{0x1c, 0x1, 0x2, {r17, r18, r19}}}, @cred={{0x1c, 0x1, 0x2, {r20, r21, r22}}}, @cred={{0x1c, 0x1, 0x2, {r23, r24, r25}}}], 0xf8, 0x810}, {&(0x7f0000001b40)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003140)=[{&(0x7f0000001bc0)="efaba95dc4bb6d8de80c8e1db375a909d6a7a4e961e44b9e69a584acc7bd8e3cd952104471b5bd7d0be4d92e9a8ed07029251d944a71180a5b7d4740367cff39905c9ad521227f5c465a25fe35132cc33aed3779e662ac589d7445f55550679d80bb390346c1489af82f20a2d7ca91cf3aad7f2ac569ad29e77e7cb809a8dff6c84538c2b60df35e662e9917c61acf8e60eb1c2321c8fc040dfd73951837ea0642b4a59cc66c937b701f15529f77b84c11e6bf09802ee0aa1b004ead7ba452ee6ceece4acfa328c057bdeb3d5415a17a59746fa1694450", 0xd7}, {&(0x7f0000001cc0)="c1ceefcc0f96a30258d54d0f5f9033f60712446f7f411df372d146488ffe37bcab009dc1e1a8bd9a3a0e830f072c59a327ce", 0x32}, {&(0x7f0000001d00)="4edf9170210d9962abbb423a0befce5c5399a60588ea5a17d4100aded1bba54aff8492198d4ba59e0d848549d66591e3733665a9ef0b", 0x36}, {&(0x7f0000001d40)="4ee64eeea7f1e4011eadc0a3cf1800f6a07965342c6d540d79ea0f546b2169508732978bd8e43bb7da0ec2b83c99a0e8646d6e0532ae74382525f746e5c5163720e88e50e63b61445ee98d6517b7e7907910fdb4f5cbf9cfa2a357c94f7709929fb9c9d46fba", 0x66}, {&(0x7f0000001dc0)="cb8cce6a1b738e0e9c27b1259426a33f8e52dbf493ead05a02c449be1c9f451e836bfaedefebf96f2fc66a6d6d716194a1470ac91e10e1c1319dc00411be2c58a1a17853fe10c8f422956ced6099730ff18d3d4856a3005372275cb6e26033eb27fc5e1df1fc637ad9a4c496b24d6876bad8fc70b5e179ea8ff28dd469c17741b49ae30089a0d2a3be988ef52d5ad3adf10fa458624ab961d286c0582bd2197bb6fffbca1edc1fd69e7f81c3ffc8d4adc70b845e3da5e8022e9719aad5762ab51ed37039b6c0d3f50cdf5e4867201509eb53336dfa16", 0xd6}, {&(0x7f0000001ec0)="9b0994031f9e5e42ba41b7fed071b46729c4cce574f2a1f9bfae8797132eea9e0e33c7218f34bcd91d3e2bfccfa707e5ae1f25d7571b860fcfd390b2b56b", 0x3e}, {&(0x7f0000001f00)="fe7cb7646051beb91745a1bcd24fd6bbcdf19e13678b57462207e14d512708468d853dfbd24cb0c569d2c6221edf35c7b6f7ee1700e0fe3e67e4e77a81e809", 0x3f}, {&(0x7f0000001f40)="a5acab59cffb0d6b2801bf00a11fa20008d1cd21b971cb0246b153206617f8d9382ca6dce65b4141c13ebdabab5ee15ae3ff647a998ae7f26019d3c9abd1dcfe746e78c71fc355ece86181750dd224823ad48fb4b5c4830bd14a36c2fe6da645fa4da8661de8181ec1e9612a3c3a86e8062910d1bba6bdcb518bd0ddd3dd9b039266a4a823789fd90c089b311714009b777756030732c6bd56641e580255d0b6b1e6929f619c8fc7888db3a850d33aa01c2f081ecb2e885f954c56d99e708703618e312a48c80b6c309b1ad82c3472adf1ef898649049edd5bd9ddbadd26a10953e27151", 0xe4}, {&(0x7f0000002040)="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", 0x1000}, {&(0x7f0000003040)="64ce9bbe93bfce749cf5cde065dae247a522ffd257ed9dfe751c56e0f9b7568ef314c2b633aa65cb9c583d9b0e87b2ec049a5ff3a3622841c238338ceab12a7e9a4fb0398f5f468add1bce7f70c984da6dc1705f4dd86fb7166d99c52ed049e54d20df29f3a71911b72acc145719eb9454a2d2b22d69edfb2f2d211220d73a1601a4037fda44bde723ce27bfa87f5107b1c34954ae32faba4fd1100536f6fcbb54391f3070215aee25a93a23746d7c50527a3f6187cd4b0c0946db44d99b3ff88a6ac63a401911f28e549183665e2219c85cdb8a32a61b450e953947de900ef9458bf77f5824eaf130f827ee8262b7321d923cb54697904a8b", 0xf9}], 0xa, &(0x7f0000003500)=[@cred={{0x1c, 0x1, 0x2, {r26, r27, r28}}}, @rights={{0x14, 0x1, 0x1, [r3]}}, @cred={{0x1c, 0x1, 0x2, {r29, r30, r31}}}], 0x58, 0x10}, {&(0x7f0000003580)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000004600)=[{&(0x7f0000003600)="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", 0x1000}], 0x1, &(0x7f0000004640)=[@rights={{0x10}}, @rights={{0x28, 0x1, 0x1, [r0, r4, r2, r2, r0, r3]}}], 0x38, 0x40}, {&(0x7f0000004680)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000005bc0)=[{&(0x7f0000004700)="97f6dbc7589eefc361b57d6aee2165af7ee831c89f98cdbd9d43592f3fc7", 0x1e}, {&(0x7f0000004740)="daf7f2b22f01c10cd9cc4592d74324931b817bb3938bc9aa85037eaf4fc4830b5fda025aefc452d23e5804fa18196caedb944795d1ee41ad6adfb690ae844a99c86113c058bef72cf1836b99575d2942a78464fb1bba31d01ae1e97e643b088f1772a680f746ae50c6606b12c47c596566f2424bdb67bc36c2eab08501c5f6a37d45d6686eec4b106a7e9f9d6b1122c5825beeca67e27092f52d20961a70f1c787dbdd67f76364ae41045f6e20b54235cbae55d4a5783c2fc20ce286189a372c09b245b25716db94fe07208892c5139022fbc87dcfa8e5e17f26721912db970dc71594c0", 0xe4}, {&(0x7f0000004840)="0653d35a52fb966c7236b8a22cae683ffdc7f57e6cec36f48fddca396523967aa2e24e9da70024668a94cfa4fc9f7b24e5257157af3ea8fbcff777dc2fdcdbb6a304ac0ccf10f03411060de9cde158fc1e3a7ca0523b5e21c15f5c4e4174ab2bb62d1a22f5c7d7903263162e2abc2a009d6e49f46257007f8d2f3dcbb49bcd1aa2f12645bbeb5aba040f11c40973c95b2fea6089747c559f4fe7e1b06c1d54c5b71248d4b2bdddfb62b181b88ae8a4413d2fcff5f17216acbb80bfb3282b9bf1698daef397c6ab4d3c8ac661532a9f6381861638ccc1f61a03836a98f81bd7df66aa6633", 0xe4}, {&(0x7f0000004940)="a2cd08d3e37f049a8efbc654d20918b5699cac4fe0a68b4750dd2cacd6de6c73df85a10f44401cfe667200486efb85fa33f4a3955fe56eb9f2ec3f27424b0311ae1d4befa534c97a370bae6ed8bd48fce6c04d8a186e220cbe938db57b81fccb7f00e4551089f5a5413fc8acbd0e212e882bedce6688bda4b9b19ca56ac1b7eadc09f328fce70e31496e0f5d59e92b60bc6b2a56c95d2c7d36d969b4dbcba67c939b0fabf15e4064779fa66fd694806e651ade126cb3cec69b9a87ee5aa18ee8047ae32e76815b5f013097c9d883370877c3c4c44210", 0xd6}, {&(0x7f0000004a40)="32c09b694c4f9b58543fe5bbcee25d6c0b4a772c57d3cf3b64af30475899d8ef29e1f229fc491a5b81f6c6b57360d70ea2505beb3535c77a1f12df3b526b4faaf87a65f23d1b3b7aebf79b194889fbda450a4c43f04e5d3a67607f763ca480ada7765fb78eb1c72fffa2f86a055eabe9b4f921ae5be63b3db8cf91a2fc4aa50e3613cff76a825c8c09bc1508e81607ee3db9ffce8e5c94d947157915f7d6daab951322ffb9a58da1bee38ffb14f0fca281a71b1156f8ab79bad42c8d207d89d42cbcad045a0e92ea503bcf5368d95062", 0xd0}, {&(0x7f0000004b40)="641a73a14b8b12ecdbce3af6087b4cb23fe785b4806c28c8df4d0bcae4d616284095ffafaa64d73270eb2c86152f4ab9bfa05ac73adbdaf2efff3a487d3f7bb5fec04dce2988920b9a569bfcff5d32903318b28dd34a76733aba21f508da8a6b66a652e86a4362a633d3c7258f21ea250ea913302a2ba1ca6924f6ac8ddac76f576453c8f6fbabaac345e37a6567f4fde40a9c9c9ac42ec1d2a0db080133beaf2c7885cccab3693af085dd3e11941b2c917f328908468bb310a697d8a1d48ae5d81020ebf839589cbc933067e41aea90de3b013c1a7a565ab931f63d4cabde811e84b3d8814554437569cee2e9e1a9ea661568a6c8c5a97a61579ab595829a956a4d56f55237db533d757597e4f011c64261e5f2a130e02275d1737b35d02809c060160ddf6d3a8e509cf2c57b807b80e9f880dcb99d8cd3197e1d76f5258da3a3ea0016326532a3501b7d7122e6f45780a43de16938348369dabb139ca6cd0824b38717a8b25de3260880bd8f90c8e50cf58e57624e71d9278f32c95526eac3a846b18bf4eef0e4dbb204c6df4e7530bba600ac1c35e06679a5a24f85b0df2055b7d9d8014af5751a6b79cb31e325e8ab7593e14dc1791fae505debe062ef0662c747aca81a25c7057cf541d11b3a7d23f44b9ad7f0d572e4458f0aadef662e812d993ca37afacc965db2a3e4c30b9510cf4be2d8243dbe48d315b897e30357454d50a65e98564b76abfca8eba8519200eca9e3fe0f4de43c547c63d59ef0df549ef6bf39b7a9f51a4cab1e1149f327c265eeb7ccc3fd35a340999446239b8dd7e1a3f9978eca1af39708f1a2b2d391fdb27dea676d34850b296cdfcd6da75871f446896c7b240f52a4d0c38ee8580df0aa680783d07a3c3032d26594a6b8097b0ca539bb3980e1c5541548f9a0e0a963030dec67cee0dfe316fb81055b0374f109742a35af407abd15a2a2adb84012380745ac2277bd2f2f3c6181a5bc4f8c8efe5dfd24b067acf27576ec0ccb88feaf75f871d84ae58febfb28831c998b91e276bd4196829b98b7c8bff472a1ec4b381ec93400d13ccc6d7165b4d6a272370e969b1696425e2e432511274cb21095d777d658ecea4b67f20e849e7c768e2aa220d8a11c57ac0a776cbb617dc02ece1b55db103a901163271089f7caefca11ab753e70fc2006729f71238376ef0d02a240886cbe40082b718d4c9e743d483dde54a7d02243c172fa81c150d0de34e9ba57e6e7b94c9e9ae0c5200693b7f2196d06b74874be5ecad922f74ee51026a202fbe95ed6470d9960e2ca0b6e86438394631a4051997131fb60871d67f9b283182eeade626932aa5478283f487ac165c5c01fed5e805ae437b0faf0126ea15b811d55c04b96898e3b243fcc13f68e31446100ec60c82ec041f0c207d192ca4737e223da7676e9143e591745a551c1420211f6ca7ef6465638e73c9798fb8a1eada177e8d70f610c7fa011f28a3cb9725c1e247f7312b151e3e85056bab7f3b11feebbb091f2c9914f06766851e4eeb0fbb4917f8b345ca7c1dab36ebbd585dbe0f75817943adf4e46b429ba6679475250f3e6e704158c7ed76e353846c6cf482a8737a5df7027fdc677e597eec0be8888b016209f6342b9e78ce4314f86deb57e5bbe840b71f3010b73b73d71819efe84a5f580eca061013169d46cbd41184135124e82ae861f7d5b6740548b0e5224785fb7565a8779854e253cb727a087b10f2dc7a2bed9bd8b170a158e96ca781c67265610facc774ee3516d396cf3a0f135524d67ba41a812d63c71c762d406bc50ac0c5889b7f1a62ae1fcc5fee563fa4948be19423c2576939969e254e787191c0b9f9c983fbc5382f58d1dbd123a69e75590fcc958a19d4c0b6b6cef4548d528dc2f51332c8a80590ffbe8093e3027cec4e89250c700ca18278e8a102d0d93717c0dee59f369227458db766d760e1eca264bd3d1507c7f8d5b0cb2afd5f17269032954fd8b7a9e6a82d963581d8ed9de64c151b0b0c669ca7184ae211a988a2bbdccbba511e493732ff62d2c7e84413e0c12b4c1f4cbd38e7d0748aa057ff695dde270c670f81afe1cb71132bff80c7b5f4771a2f9225a4a6e2bcf6f1ab9f5b8c7763c611da396ae0e58fb9fbd6c7a1851852c580865d831ad5ddbbfb07734554f929e012c72a3735d59d9c115581feb3a8a6fc2bc61461f53204440bf4a28ba69351d999c215c268d897b50f543093672cbeb3222cef878c2c2a1144c437fcae841f0c5f819e28d0e133cfeb98d80b84cb7a6c81c41c9da7155a03acb803239c48f6788971e38b255bf27859b4cba35e965e5feba00e8c3854a66b226e86b3deea6bee583a15f67ddb1c66aa386106025b3ba46c61cc9a5e0eb2a4746cd8a8e70e34c850d5887447ddf3f84a6f6798184d460f684602b489de95da773d1d53425f317c94e73a341c4b64e0f794ea97ecc83c2e1ed6dbf91e3b4a6d1f04881bd927fe6d4e4b209e62ea07b564dcf3851764b81ae551faf0a654cc97d3dbbf0200dd171cdb9099741051a1a1cd7f1ad46a3d2412520a9cd0bb3b2e4e81339d07ea291e5f63b41b06b5b0b48e4c8705956820cf4f6562838663b1c2046c912ab2f8c82c6b7a971b14ae5fb2e95b53e79d1174ffc326d0af01efed676110575dd2cc5a4405db9c36cabd63653859dc6ca7bf7ded1a3ad0eb1d11b38130e0db468c5d585fe25bb0e83de51a30878ed8fd0c1cdea6f178620ee6bd349a10cb279afed8f77e6e7d14776d9a0c9f568786e9c4e7603341386d871aed308f06c923a67f58f722e545fa7d583241357d4b6929bfc7ff8c56746cd00fe4e77652300ecb8ada720804e5b8cd7426a460cc460ca26e57ee330979a4e7d7a6addc195efd8fbf61d31f09393e892de01937948027efafd32c19266998d9714484ec4209bce868a291498b11e3aa8eac2c4e4a4e020b52fc51433de18958b1e962b7a629ebd2821ccbf6d119aedd647be37bcddb3432afcb4b8dace1d82a35fa7c0bbdf0ce993c964b65028a4117d4e78d7978b6a246018b73566fdbeffe2c0cb1a7612d0c58133b115776ec40a343f5b9788085216eada91c0b720f3b38646a1f2b854bc6d59b803beb0683069adfc7e0f485b993332fba5363f03299a21e72e4103c0e9aba761dedd8bcb32be8ac76dfa8e8bb84c70515b7571e954486a5ace8ac67dbd21cf8aa23edd4809a535ddb014e108aa114cdd606266466b2532b82d958e5392ea5897c8ca693eef2293fb5aa961688b68597fcb7e2775f4be302fc85e3aed19d7b31ff1498be0da3cce5ccb965d3e6e454c530eebf6861fddcc8c9e6996d5ec61dd47aface81891227bbabf1182c832d60f9f6c4e6dc23149f73c9488b4fa99a46337cd268694d7b4c3a879c1dd93d0ba30379ba6db71d2711c31005cbfabc53ba303a99d2ca23e6f6b3ecb13ff3f832a1c043fa50bce96fd70705c7bdd511afd46775d57776192a4fd6c41d0886d92353e7108fff01d722087acd3f5214dd1775ff7a0e693f9c69545f81e82c6a187b3269e3faf8139d9e490a5ff80099b40211245d6599a2cf7d827bcfdd702b30d8de39d7511556469f71108275221948159ffdc544749388de1fed38222fd07c12e39cf9afcdeef1660d166034a16f3a3f35ee9f2f9d2871cc94255431f32f07fb5d33317b7b0d1aedb3b1dd330b95e2a27f2f3748e3a5113f72037d3ab2df79f13465c2be04383670e9de59781a771a02dcc2cd05de100abc327f8cf0dd1b67993a195f9608c1f226fc90bf63ee2796157455a4c3457faac7b5cdff6e401a0cb7a6b6918dd7b4537ca8d026946769dfcac4be9c3adb7a5bb6c442fa81859909545f9fa2f382595e33503a42cfdaf945726fea3285928952ff06eff846a818b723190172d07e352f8a85511139594966709e7d7b4b71d45440e24ec3c88895bb22afca4068e7a8de07d1ec8afb62cbf206746e65b257a86cd16f490186fadbbc7b355a412944a73d2afc92d1486e3e6b2689017ad26c811aea1283f6091d5ce401344b95e63e227cf872311df099cef124f407571f5ffba77e3b9ec31b539637077045356dad5a57645b04dcc62ffc0e1f8aa0f27951e33a6fa09f78ff9e933dafaac98aaf8d3d6bfdbf3ef560afbeb8e2cb293df8540675bf1cb94a2547c51bfadaa534542ba77d87807fb498dbaed02a9c21a1501f60d67b2854d14eb0fa8740b4bb837306fe8efb3a9d8b85c12f334f97cc621b6cdfd49a7de7d660a907f4e875d9a4904cafb064c226f5c441646c716353ab459a921c164e7212412d417c0830d277cbf86b343b47f80671adaa458f8a159fb7ef00c32deea60983723bff55fd84ee64c43eca755c3c78539bd7e3327abf58ba68d100818a7e7afda276b9ad807d0c62e5fa2f53f4727c06a2c15f053591b13f990dafff64321e8e2bdaa7cf5ecb587c75968b288ebe03e5349bbbd6f54599aa01262867518336fca69c1ee1bc7450b0684359477600c41a5ed8d2639e39e917d7fef9f0130370f89fb7aa1615fc94a9057ee42960e9fc55cb2a778b2a11ee17f93cd6ff8afdaa7778459014906eefb59845d1c05981ccebb5db0d641381c1619311aac17ab79e68a138b86d68e7626aed5ef6c12b3d5bb4984f1d693e1aacea1fe7676632b18545de4e2c1327f4d18309fe0ec4f6650679ab0d0c40c6cd0d43465412087e42799c1aa6fe952f3d1922113d3423583175d47cc7ae5f30300a70ee172dd1654473206c530b0c33fd9fc6ef886b95e29ba7c44718e7481b0bc87e474a3b1192b83af49c5df40ecf760a98d8670581ebef3d714a1dd11c3db48da014e277fa6180350ec0e106f121466ede413e5124fa32cb953b11b2a7f32756bd41733d6bcb6c19e17742da16bf2420274a44e76c3121040ac780dcae1d7d1bf4a4aced2fb824054ffc0221f7d05f7f9b7250a121f457c3da6376652ac582d83198c2a5826fc2816b8ee37aa83d9e314e9eff0f6a0070283e175a1b839696efb671530e037a75529389a439e81e727ec8819d6ef7e5e74a50e4be68c834d944e0e3e0693719c7a3c774325dc0fc4a401441c54f5c9609d84acb4df68661814875f1e5d7b21b2ea21edc71b02438e4d04720ae8beff85b18b484c8c46e6fef332a590baeaa07f4ecd505c321281a82d7b0d98b758309a939e89ed1ed7e246f3df999ab94f427e572bfbd3963dea11c1951eeef57c426e9e3c0e6a41381b079f0d7af41bfeb9375307e1be4bf4324ff9a3cb760d721de3762cca2d6581fb86063b924ea444bae5fbf2fd56f503b6965e9819b2fc57bddcc1939dba7d9273d6a0970c19ab802a52b546a667268119f16433084f20a2b9333dce034515708e216b6093d88ef227d7168c7e5c16031703b4fe525657c6eed76cb1dce013f5409fc9a7805588ce9f5905eb2a684d30927148edd36c5a0b2c8e6b3599271966142bdabd325ec86ba143462897373bb6f7dc3fc25c4f8a6f2ef66e33a5de9eaee3ed5cee03e9804bea18d90f702a0ebec6341624d1857c0950f0e7e97e21203f7e517c61e14fb93f3d57335448f9d770cbb3d814f26dddeed259db9ef775b98a40ebb8d07691cc0bd18aa0a4023f1b0577f4040e0500ae7a2874b397796f32cca4eed7de186e27279ea193c0f2aa6d51795b2f93c203a6c303aebc0f93db68b9deff7160e64032a370c02dada2ae2a90a7dac384aaf22bfb24570c09f7c292a5b48e5d384b3b25dc587bd1554231e78063d124df05e24f51043717c2058c26f8dae8", 0x1000}, {&(0x7f0000005b40)="212853492e2b6b71ffff90fb379980cc8b68a7141b96ab2290baf988c0f5627afec4800854a42324d1d19d40f840c3ac23556973a3c6289d39f0742065d8a7d78d2fc2178320a6ce", 0x48}], 0x7, &(0x7f0000005fc0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r4, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r32, @ANYRES32=r33, @ANYRES32=r34, @ANYBLOB="0000000001000004", @ANYRES32=r0, @ANYRES32=r4, @ANYRES32=r3, @ANYRES32=r0, @ANYRES32=r2, @ANYRES32=r3, @ANYRES32=r1, @ANYRES32=r4, @ANYRES32=r3, @ANYRES32=r2, @ANYBLOB="20000000000000000100000001000000", @ANYRES32=r3, @ANYRES32=r1, @ANYRES32=r2, @ANYRES32=r4, @ANYBLOB="1c000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r2, @ANYRES32=r2, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r35, @ANYRES32=r36, @ANYRES32=r37, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32=r4, @ANYRES32=r2], 0xe8, 0x80}], 0x6, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f00000000c0)=0xc) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) write$P9_RVERSION(r4, &(0x7f0000000240)={0x13, 0x65, 0xffff, 0x3, 0x6, '9P2000'}, 0x13) r39 = syz_open_procfs(r38, &(0x7f0000000080)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r39) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x40001, 0x0) 04:13:45 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80d", [[]]}, 0x1f8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x50) write$P9_RREADLINK(r1, &(0x7f00000000c0)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$apparmor_exec(r2, &(0x7f00000002c0)=ANY=[], 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r3) 04:13:45 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0x0, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2}, [{0x0, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x223) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r1, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x6f, 0x1, {0x1, [{0x14, 0x2, 0x4}]}}, 0x16) write(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:45 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0xfe) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) mkdir(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)=0x20430002) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r2) fcntl$dupfd(0xffffffffffffffff, 0x0, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) fstat(r2, &(0x7f0000000080)) 04:13:45 executing program 4: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r0, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x6f, 0x1, {0x1, [{0x14, 0x2, 0x4}]}}, 0x16) write(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r1) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:46 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000400)={{0x20, 0xfffffffffffffffc, 0x7ff, 0x100000000}, 'syz0\x00', 0x23}) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0xfe) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) dup(r1) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000780)='/selinux/status\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r3, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) mkdir(0x0, 0x2) write(0xffffffffffffffff, 0x0, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(r4, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000180)={&(0x7f0000000380)={0x78, r5, 0x706, 0x70bd2b, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0x64, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_LINK_PROP={0x4}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}]}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x20040804) setsockopt$inet_tcp_TLS_RX(r4, 0x6, 0x2, &(0x7f0000000340)=@ccm_128={{0x304}, "06a39007ff2a61f1", "11570e0fd931d8acbdbd0802ddbed314", "798111a1", "b551ce5573f21e20"}, 0x28) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r6, &(0x7f0000000540)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000400}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x24, r7, 0x2, 0x70bd2a, 0x25dfdbff, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x4dc1}}, ["", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGETD(r6, 0x5424, &(0x7f0000000200)) setsockopt$inet_opts(r4, 0x0, 0x0, &(0x7f00000002c0)="788f502fef1fe93afac51a7f8e942503e0503d305b4a37325af3a8e62bb86a77c978e7aac23594096f85e8d08b81058948b82b30fa556d66ab234df231700748d3a2672a3db4b43a6c472d522d64ca04d09402f6d2d70ebbb8f2bb503ae1ae7c1c2b2e5cc676d3a8e1af19d9fc0f9bc2e207cd1eb495fb7702b0", 0x7a) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000280)={0xfff, 0x200, 0x4af, 0xfff, 0xfffffffffffff800}) 04:13:46 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80d", [[]]}, 0x1f8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) write(0xffffffffffffffff, 0x0, 0x0) fallocate(r1, 0x56, 0x6, 0x34) write$apparmor_exec(r1, &(0x7f00000002c0)=ANY=[], 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) 04:13:46 executing program 4: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x8000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000000080)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x54f246a67a84bfe, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000100)=0xfd6b) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x2c001, 0x0) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) write$apparmor_exec(r1, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') 04:13:46 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0x0, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2}, [{0x0, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}], "", [[]]}, 0x158) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r1, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x6f, 0x1, {0x1, [{0x14, 0x2, 0x4}]}}, 0x16) write(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:46 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x60000007, 0x2e0854ef, 0x0, 0x0, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf8", [[]]}, 0x20a) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x100, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000140)=""/88) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x101000, 0x0) socket(0x0, 0x400000000000003, 0x0) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:46 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80d", [[]]}, 0x1f8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000003e40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)=""/4096, 0x1000}, {&(0x7f0000000080)=""/152, 0x98}], 0x2, &(0x7f0000001480)=""/226, 0xe2}, 0x896}, {{&(0x7f00000001c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000002880)=[{&(0x7f0000001580)=""/177, 0xb1}, {&(0x7f0000000240)=""/16, 0x10}, {&(0x7f0000001640)=""/92, 0x5c}, {&(0x7f00000016c0)=""/24, 0x18}, {&(0x7f0000001700)=""/39, 0x27}, {&(0x7f0000001740)=""/4096, 0x1000}, {&(0x7f0000002740)}, {&(0x7f0000002780)=""/214, 0xd6}], 0x8, &(0x7f0000002900)=""/211, 0xd3}, 0x5}, {{&(0x7f0000002a00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000003dc0)=[{&(0x7f0000002a80)=""/88, 0x58}, {&(0x7f0000002b00)=""/1, 0x1}, {&(0x7f0000002b40)=""/165, 0xa5}, {&(0x7f0000002c00)=""/192, 0xc0}, {&(0x7f0000002cc0)=""/207, 0xcf}, {&(0x7f0000002dc0)=""/4096, 0x1000}], 0x6}, 0x9}], 0x3, 0x10000, &(0x7f0000003f00)={0x77359400}) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$apparmor_exec(r2, &(0x7f00000002c0)=ANY=[], 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r3) 04:13:46 executing program 0: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x0, 0x0, 0x9, 0x0, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab87"}, 0xfe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) mkdir(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') readv(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)=""/37, 0x25}, {&(0x7f00000000c0)=""/7, 0x7}, {&(0x7f0000000100)=""/33, 0x21}, {&(0x7f0000000140)=""/100, 0x64}, {&(0x7f0000000380)=""/225, 0xe1}], 0x5) fcntl$dupfd(0xffffffffffffffff, 0x0, r0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:46 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/policy\x00', 0x0, 0x0) write$selinux_load(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="8cff7cf9080080005345204c696e8b784911f4ebedf3fdb19ba07db44622a769394160"], 0x23) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x0, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}, {0x60000007, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x243) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$FS_IOC_SETVERSION(r2, 0x40087602, &(0x7f0000000180)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r3) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:46 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0x0, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2}, [{0x0, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}], "", [[]]}, 0x158) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r1, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x6f, 0x1, {0x1, [{0x14, 0x2, 0x4}]}}, 0x16) write(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:46 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/525], 0x20a) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) socket(0x0, 0x400000000000003, 0x0) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') eventfd(0x3ff) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:46 executing program 4: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000000c0)=0xfffffffffffffd7e) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x2c001, 0x0) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) write$apparmor_exec(r0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') 04:13:46 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x74, r1, 0xd00, 0x70bd2a, 0x25dfdbff, {}, [@TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7ff}]}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xa2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x401}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xcce}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}]}, @TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1fffffffe0000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x830}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x200}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x100000001}]}]}, 0x74}, 0x1, 0x0, 0x0, 0x48004}, 0x800) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x0, 0x0, 0x9, 0x0, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab87"}, 0xfe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) mkdir(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:46 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="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"/510], 0x1f8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) epoll_pwait(r0, &(0x7f0000000380)=[{}, {}, {}, {}], 0x4, 0x34775f18, &(0x7f00000003c0)={0x2}, 0x8) prctl$PR_SET_DUMPABLE(0x4, 0x2) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$apparmor_exec(r1, &(0x7f00000002c0)=ANY=[], 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000080)=0x0) timer_create(0x7, &(0x7f00000000c0)={0x0, 0x23, 0x4, @tid=r3}, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x406, r2) timerfd_create(0x1, 0x800) 04:13:46 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x0, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}, {0x60000007, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x243) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r1) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000540)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000500)={&(0x7f0000000580)={0x110, r2, 0x30, 0x70bd2a, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_DEST={0x34, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x9}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e23}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xfff}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x81a8}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x9}]}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x7fffffff}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x1}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x5f078c6c}, @IPVS_DEST_ATTR_FWD_METHOD={0x8}, @IPVS_DEST_ATTR_WEIGHT={0x8}]}, @IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x1ff}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@remote}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x18}, @IPVS_CMD_ATTR_DAEMON={0x4c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x40}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'tunl0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @empty}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}]}]}, 0x110}, 0x1, 0x0, 0x0, 0x44811}, 0x4) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:46 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="7f454c4600089c23060000000000000002003e0007000000b8000000380000002a02000005ff01020000f00000000007000060ef54082e000000000000000001000100090000000500000009000000a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88bf08dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf800"/522], 0x20a) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) socket(0x0, 0x400000000000003, 0x0) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x610000, 0x0) getresgid(&(0x7f0000000100), &(0x7f0000000180), &(0x7f00000001c0)) fcntl$setpipe(r1, 0x407, 0x7fff) [ 301.046042] audit: type=1400 audit(1560831226.667:27): avc: denied { wake_alarm } for pid=24588 comm="syz-executor.1" capability=35 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 04:13:46 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000000c0)) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x2c001, 0x0) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) write$apparmor_exec(r1, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') 04:13:46 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x0, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}, {0x60000007, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x243) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') r2 = fcntl$dupfd(0xffffffffffffffff, 0x406, r1) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_IRQP_SET(r2, 0x4008700c, 0x93e) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:46 executing program 0: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x0, 0x0, 0x9, 0x0, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab87"}, 0xfe) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000000c0)=0x14, 0x800) socket$nl_generic(0x10, 0x3, 0x10) r1 = dup(r0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000100)) mkdir(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') setsockopt$IP_VS_SO_SET_EDITDEST(r2, 0x0, 0x489, &(0x7f0000000140)={{0x32, @empty, 0x4e20, 0x3, 'fo\x00', 0x0, 0xfffffffffffffff8, 0x73}, {@loopback, 0x4e20, 0x2, 0x9, 0x2, 0xc24}}, 0x44) fcntl$dupfd(0xffffffffffffffff, 0x0, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:46 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80d", [[]]}, 0x1f8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x182) ioctl$LOOP_SET_FD(r1, 0x1277, 0xffffffffffffffff) mkdir(0x0, 0x84) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$apparmor_exec(r2, &(0x7f00000002c0)=ANY=[], 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='Dd\x14\xaazk3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r3) 04:13:46 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x0, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}, {0x60000007, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x243) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(r0, 0x406, r1) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_DEL(r2, 0x0, 0x484, &(0x7f0000000100)={0x33, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e21, 0x1, 'lblcr\x00', 0x3d, 0x522d, 0xc}, 0x2c) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:47 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0x0, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2}, [{0x0, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}], "", [[]]}, 0x158) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r1, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x6f, 0x1, {0x1, [{0x14, 0x2, 0x4}]}}, 0x16) write(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:47 executing program 0: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x0, 0x0, 0x9, 0x0, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab87"}, 0xfe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) mkdir(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, r0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000080)={{0x2, 0x0, 0x18bf, 0x3, 0x3}, 0x9, 0x25b, 0x200}) 04:13:47 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x60000007, 0x2e0854ef, 0x0, 0x0, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf8", [[]]}, 0x20a) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x7fff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) socket(0x0, 0x400000000000003, 0x0) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000180)={0x2, {{0x2, 0x4e21, @multicast1}}}, 0x88) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x400, 0x0) 04:13:47 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) r1 = openat$cgroup_ro(r0, &(0x7f0000000100)='memory.events\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000140)={0xff, 0x9, 0x2}) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x2, 0x0) ioctl$KDSKBLED(r2, 0x4b65, 0x100000001) bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x8}, 0x10) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000000c0)) openat$full(0xffffffffffffff9c, 0x0, 0x2c001, 0x0) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) write$apparmor_exec(r1, 0x0, 0xfffffffffffffcd4) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') 04:13:47 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x5ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80d", [[]]}, 0x1f8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x3, 0x80) getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) exit_group(0x2) write(0xffffffffffffffff, 0x0, 0x0) write$apparmor_exec(r2, &(0x7f00000002c0)=ANY=[], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r2, 0x0, 0x1, &(0x7f0000000080)='\x00', 0xffffffffffffffff}, 0x30) r4 = syz_open_procfs(r3, &(0x7f0000000180)='\x00\x00\x00\x00\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r4) 04:13:47 executing program 0: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x0, 0x0, 0x9, 0x0, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab87"}, 0xfe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) mkdir(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, r0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:47 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80d", [[]]}, 0x1f8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$apparmor_exec(r1, &(0x7f00000002c0)=ANY=[], 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) r3 = syz_open_procfs(r2, &(0x7f00000000c0)='taFer_ ') fcntl$dupfd(0xffffffffffffffff, 0x406, r3) 04:13:47 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x0, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}, {0x60000007, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x243) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x200020fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/mls\x00', 0x0, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, 0x0, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:47 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x880, 0x0) write$cgroup_int(r1, &(0x7f0000000180)=0xffff, 0x12) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) r2 = dup2(r0, r0) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, &(0x7f0000000080), &(0x7f0000000100)=0x30) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000000c0)) r3 = openat$full(0xffffffffffffff9c, 0x0, 0x2c001, 0x0) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) write$apparmor_exec(r3, 0x0, 0x69337432c14ca274) ioctl$BLKROGET(r1, 0x125e, &(0x7f0000000540)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000001c0)={{{@in, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@dev}}, &(0x7f00000002c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000300)={{{@in6, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f0000000400)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000440)={{{@in=@empty, @in6=@ipv4={[], [], @local}, 0x4e24, 0x0, 0x4e24, 0x0, 0xa, 0x80, 0x80, 0x73, r4, r5}, {0x8, 0x1, 0xaff, 0x7, 0xf19f, 0x8, 0xfff, 0x7}, {0x0, 0x17ed4924, 0x7, 0x1f}, 0x1, 0x6e6bb7, 0x2, 0x0, 0x3}, {{@in=@multicast2, 0x4d4, 0xff}, 0x2, @in=@loopback, 0x3505, 0x3, 0x3, 0x9, 0x39d2efdf, 0x1, 0x10001}}, 0xe8) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') 04:13:47 executing program 0: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) r0 = accept(0xffffffffffffff9c, &(0x7f0000000180)=@nl, &(0x7f0000000200)=0x80) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000380)) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x0, 0x0, 0x9, 0x0, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab87"}, 0xfe) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)=0x0) fcntl$setown(r1, 0x8, r2) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) mkdir(0x0, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, r3) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:47 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x60000007, 0x2e0854ef, 0x0, 0x0, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf8", [[]]}, 0x20a) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) socket(0x0, 0x400000000000003, 0x0) write$apparmor_exec(r1, 0x0, 0xad) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:47 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0x0, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2}, [{0x0, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf", [[]]}, 0x1be) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r1, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x6f, 0x1, {0x1, [{0x14, 0x2, 0x4}]}}, 0x16) write(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:47 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0x0, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2}, [{0x0, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf", [[]]}, 0x1be) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r1, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x6f, 0x1, {0x1, [{0x14, 0x2, 0x4}]}}, 0x16) write(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:47 executing program 4: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000000c0)) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x2c001, 0x0) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) write$FUSE_IOCTL(r0, &(0x7f0000000080)={0x20, 0xffffffffffffffda, 0x3, {0x668, 0x4, 0x100, 0x8}}, 0x20) write$apparmor_exec(r0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') 04:13:47 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x7ffd) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x0, 0x0, 0x9, 0x0, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab87"}, 0xfe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) mkdir(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000080)="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") r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000180)={0x0, @speck128}) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:47 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x60000007, 0x2e0854ef, 0x0, 0x0, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf8", [[]]}, 0x20a) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000180)={&(0x7f00000004c0)={0x1d8, r2, 0x0, 0x70bd29, 0x25dfdbfb, {}, [@TIPC_NLA_NET={0x20, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0xfffffffffffffffe}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x4}, @TIPC_NLA_NET_NODEID_W1={0xc}]}, @TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x209}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x65e}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_MON={0x54, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x5e5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x20}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfffffffffffffff9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5a8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xce9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3b83}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x316}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xf59}]}, @TIPC_NLA_BEARER={0x110, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x6}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x182}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10000}]}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x20}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x7, @loopback, 0xdbf}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x8001, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x46c}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x4, @dev={0xfe, 0x80, [], 0x19}}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x5, @mcast2, 0x3}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x80}]}, @TIPC_NLA_NODE={0x14, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}]}]}, 0x1d8}, 0x1, 0x0, 0x0, 0x8081}, 0x4000000) socket(0x0, 0x400000000000003, 0x0) write$apparmor_exec(r1, 0x0, 0x3cf) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:47 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0x0, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2}, [{0x0, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf", [[]]}, 0x1be) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r1, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x6f, 0x1, {0x1, [{0x14, 0x2, 0x4}]}}, 0x16) write(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:47 executing program 0: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="7f454c4600080023060000000000000002003e0000000000b8000000380000002a020000050000ff56070020000200ff01020000f00000000000000000ef54082efcffffff0000000000000000090000000000000009000000a3d371d99314c44da8835dbfc490655cdf009342f2cb607adac2dcc62247cb481bc8d84f5446e31055288869afe9e1e47bc22f2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491"], 0xfe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) mkdir(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0xfffffffffffffdb0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, r0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x141880, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, r1, 0x7, 0x1}, 0x14) 04:13:47 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000580)=ANY=[@ANYBLOB="7f454c4600089c23060000000000000002003e0007000000b8000000380000002a02000005000000070020000200ff01020000f00000000000000000ef54082efcffffff0900000001000100090000000500000009000000a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000063000000000000005cbf909dcb4add71a4e72a7afc296a4074132f41313814006af725d7b188a500876dc21ea17d125af8477ae95566b30600e7e2121b8c3e3abab79033a722a18489e98d09b51d439e18a2cbee1bd61a0c866a7ae5da641bc89039fa9a4e90064cd680a1b600fe2d5e6028e20894e5f0d15cc024b788b2d3b73a6d9618a20c716edfa981dc0929518400652200478635ef2061136892f8445569e65f8276df77930f205fa4050080ee9339795bc750395abb740ba788634e92db88293f1f055d3fc597017d8c8933d0e351f0"], 0x1f8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$apparmor_exec(r1, &(0x7f00000002c0)=ANY=[], 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) 04:13:48 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x0, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}, {0x60000007, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x243) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r1) openat$full(0xffffffffffffff9c, 0x0, 0x20000, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:48 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x0, 0x0, 0x9, 0x0, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab87"}, 0xfe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) mkdir(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000380)=@security={'security\x00', 0xe, 0x4, 0x3b8, 0x260, 0x260, 0x0, 0x138, 0x138, 0x320, 0x320, 0x320, 0x320, 0x320, 0x4, &(0x7f0000000080), {[{{@uncond, 0x0, 0xd8, 0x138, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x7ff, [0x80000000, 0x4, 0x3, 0x9, 0x7, 0x9], 0xfffffffffffff78f, 0x9}}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x9, [0x0, 0x4, 0x0, 0x0, 0x1], 0x1, 0x4}, {0x2, [0x8, 0xfffffffffffffffa, 0x42d8, 0xcaf, 0x6, 0xfa8], 0x5, 0x5}}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x800, 0x81}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x7, [0x9b1c201, 0x9, 0x3d3, 0x3, 0x70000000000000, 0x80000000], 0x6, 0x9}, {0x6, [0x401, 0x10000, 0xf2, 0x29, 0x1, 0x3f], 0x400, 0x3}}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, 0xffffff00, 0xffffff00, 'hwsim0\x00', 'teql0\x00', {0xff}, {0xff}, 0x6f, 0x2, 0x8}, 0x0, 0x98, 0xc0}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x8, 0x6, 0x3}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x418) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, r1) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:48 executing program 4: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000180)=0x100000001) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000000c0)) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x2c001, 0x0) write(0xffffffffffffffff, &(0x7f0000000100)="240068cc210071fd8042ba27ac38fc020200000000100f000ee1000c08000a0000000000c7ebe6e0117f845d070359efb0bf7e9994c9de7c8004a80add27e183830f28d6c64a659804", 0xd) write$apparmor_exec(r1, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') 04:13:48 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0x0, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2}, [{0x0, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc2684", [[]]}, 0x1f1) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r1, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x6f, 0x1, {0x1, [{0x14, 0x2, 0x4}]}}, 0x16) write(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:48 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1f8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) dup(r0) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) write(0xffffffffffffffff, 0x0, 0xfffffffffffffcea) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000000c0)=""/16, &(0x7f0000000100)=0x10) write$apparmor_exec(r2, &(0x7f00000002c0)=ANY=[], 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r3) 04:13:48 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x20a) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) socket(0x0, 0x400000000000003, 0x0) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/raw6\x00') openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x5, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) 04:13:48 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x243) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcae9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r1) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:48 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0x0, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2}, [{0x0, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc2684", [[]]}, 0x1f1) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r1, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x6f, 0x1, {0x1, [{0x14, 0x2, 0x4}]}}, 0x16) write(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:48 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x0, 0x0, 0x9, 0x0, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab87"}, 0xfe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) mkdir(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, r1) openat$full(0xffffffffffffff9c, 0x0, 0x2000000, 0x0) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x1) 04:13:48 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000000c0)) openat$selinux_create(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/create\x00', 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x2c001, 0x0) vmsplice(r0, &(0x7f0000000340)=[{&(0x7f0000000100)="f3038ba23bdefca1b7900d34f14b3c648cd8cd86e2e2a05fd445ba23e2206fc4c3ac412c1e9e91bdc3f3c43bf1f118f6f45201717211079ab370f6d91b61ae306365b1383973cef94667f15b53cdfff56a038db9ee3440c356bed9358a28b69563b128a038bcee227da46ba94a2315eb31492ee43e1cb599604e8c09c4e933d511e221d43c7acb52fcdd2ef61e3b06084c041844fdc63ae76b532d73c053b3243e36aaa62d076f730d882164f7baf44a743552a4a5b847826bb0e96f128c22ec", 0xc0}, {&(0x7f0000001140)="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", 0x1000}, {&(0x7f00000001c0)="99f01ec6df35f49b6f371525e3ca8a9a51c31b7655a7f569218eb307cade57f8851d8565045fdb45370c9249e30826f9d3588b91b86d49048227d7121aa418fa7dba2a1cdda81005721f973ed82e4b64bfdfafcb3ab86105267209c99156f0c1903a919a261d4cbfc4b7c7ff3acc7552efcd18616ee69e2e042dd97cbe70dd29cd39b61d837e6c5f0534edb3aeec972219028a1aa1864e4703aa45a41cccf3952b784629b9825c1655110e2036bb62abcf3831febfc7ef865f1ad62f236ddf571a7ad6854574c35a8f05", 0xca}, {&(0x7f00000002c0)="0e7544fc8302648f149446a90185f59fc287e4cdc6b6ae3bd628953f9c1fb3cf4bbf105a0b1acbbab2e24e3b86546caa929bfa12ecd47e4dc6c86abfbeaaa408fbf84b2c8fc650585ffc9fcb1327bed7ee8346e650d72ee7631437cb8fc775b0995f43bc9c36ecf7", 0x68}, {&(0x7f0000000080)='j', 0x1}, {&(0x7f0000002140)="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", 0x1000}], 0x6, 0x8) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) write$apparmor_exec(r1, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') 04:13:48 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x0, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}, {0x60000007, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x243) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$binfmt_script(r0, &(0x7f0000000100)={'#! ', './file0', [{}, {0x20, 'fd/3\x00'}], 0xa, "1d0d8b33c00e3e9ab808ddf5c319df6d653061873c51721684f2c60db2a80f8e15"}, 0x33) mmap$perf(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, r1, 0x0) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:48 executing program 0: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0xb8, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x0, 0x2e0854ef, 0xfffffffffffffffc, 0x0, 0x0, 0x9, 0x0, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab87"}, 0xfe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x40000, 0x0) ioctl$TIOCSTI(r0, 0x5412, 0x4567) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) mkdir(0x0, 0x0) r1 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_upper(r1, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000380)={0x0, 0xfb, 0x1015, 0x3, 0x5, "c8730d77796240424f79e83354d9ffa4", "d8dac5d0314781255d4d08d8b76aac367af790932dcde6370bec04fefc89205c7fab89b65db4079df83c4e2cb021672fee6b915b63db7a0c0b458619fd507e934f21bd402c12b94a6303de6b39bf741d77b8026bc7718bdc494ece2e54fef644fa52438605a065984a493587886910b96468628ceb14744d1ea775f47e6af7193729f87960230f0f0bb07d06633fcfdf197b472db5ba66e3de11ce85ec29c19487e31d5a591aa806258c47795c582f3bd738bc0dd88bd337b9b0cf43ad58910cff6cc1c72af147d3327ddbaa309a3bba45cef1e5def45f832ba2fc485ab72165dc6f72e7469e41921d4055c70fdca47adc1ae44298863b2cd4b909ab12f6d472848dbd6e0cfc8df8f24ecd6fae61b307e37f1d3931952082e001f9eaded71d1a480150b2dbe0259f39689fa56a4e062665aa0ffb3aa81d0eee49d632bbe67c2dda6d68e58094c0891e4367522fde39dc6d208745ecc0b8de1477a9c016e6ddd57bcd3a334bf8b991dcabbeeb13b3c7b299b8c35f2b23c9e31e0ebdd51413a4e813ae69a225f2821abbbfd25ccb66875986045cc9976742c1c6aec46f06e10c3ce3280fbbb6316acd0a1984dd5dd8b482c456d72e594e3ab6eaf85216474f3ea19427d89d8b265396989a512ff2fb479e3ca07d909057eca128af78bc292051fcaa120682f50608a986ab2b22c5cf0ba96b7b69d2942486f3c1c7185c1d415ef87d0dfb2bc45a90cfa96f3f46ce72ccd0bd7d50c7ee60c41668291226bfd7c1d1e90dba6bdb3b6111f81a8aa3979791031272d3d990920f6cecfe5a61304c64b832c4c8103f08402536b5236855835a89a454cfa828d00da8bd731d67f75ace11b632f0b88c6ee5162b1c50602ac31c58cc0c616800322fc57de0a9bb753410475d226f201433c0c21f6c3a6df77c429254a509cd7d9ffe8d5f41d8d0ad4af9d77a444589db51b2a6c5a41afd2f7afe83f5e693d72c420db41bd847d8dc531daed408ddddcebee785001f7fda7f5708a309f6b3c3b2ff73713d0d8fd09ae9157ec8341addb49f66f752a5b6dcfbf8ff6a77f23fbb3d5ce9e6ba5431174c8664928d89d5c3ec3d2aab80084075b54d7c3530391bd4b69792497f79b3ec9e607ecc3d7e457bb83534f69443d343c1fb9106a0daf398603abe8cb3f462e45bb8fc6d73845a1977d2242cac42c66a3dd4c640d2170760967b3415de4061355e2af5df1762c3dca5b5c900f78ae2cbc8aa61b291d46c224eadf0c61724072e3848de65591cbe3d4826d2692d1c8614097c5a76f16d1eaac93141af0bf69ff65474a91dffbc8b8a613e291dd1c69407aee72766f702893249942fc61e6e6530e40c507a512f1adfcfe6d3e95fdac45b8ca306b6679868090097a20593bdf493ed243f1c517399d9b6341a2f30106a5b3621439c8325feb145f7612da61615bdbd0835e39286adf6eca729f4ff3e328eef000828e964b72f1127f415a4d21f87c4f4ee115d08d6a6fb092e2ae4d0a8a5e8e6feba6dbb0fd5d2a4d75da60c00fd6312f73b18a65de89e69e44538de1727b4666267e8dc56ee3efdc6e6f3c59fe4ab9bcc434ece43cbbb274ade851e8630a72bfab25c6829b23d69cc312909b0a2a28a7c4abf4c40475dafbee8e0a2c89ec6c94bf0d82cf54fcf5892bf68887eb6606d348d3ab97d5eb2095778642f5ef47aaefd4e72cf65b45a6fe7e691ee2d8b617cf9de99e8bb16a02fab5be36ece8ff301651d87b2971b12ffab51ca0995398f9cea64d8d7b97c3cc159c172ce2bec102fb694c15b411779b4c17a7109e018a630f9bee0c8aeda02f79e26d2c1144438bc8b2bc9265dda38fa5b45cc47170ee20cafdd31c64285edf9acf43424ad9edfcc97f80811cc89a66f7b6c3773a0438ffe64c7ef8799c475399c29025ce9fcf6627c6f2e58619b45884f9e9a69f663ae18f9eff0be9f422c69a946ef343a543128d1fd7d69a2f9634d71c957380b259026f73831a1e4e2e771606175fd4c719d34901c25b2e4a0821c3c72dd43862456c237bf7433466d21f4853f012ff2bb8b26ae06a4421a14d9e71f35b9c564bd1e6f8e15b035ab0a69236fdf7174baf636c32f8bb2050b09c391f5c380ea9d06d8d267be3945efe041e468d96e501d9fb6ea12dbd1f78182ae7e7065b711c57f60b94db6504de6a356a2d2934005108fffcd97f1c16afbf86e32bebc9437f1f9518837dd5be3062cc00ce3bb2090a3a3b1e8c3177599d0431d8ffe40b229b89bc31fe9e96ca2ea82bdc19eab7da1cfd764d39be8ecee39debcd7664340181aa6042b450ff5db4f4e426e7c4fddccf7e663b641e254a7edb16a207e4d180ebcfe48203a2f0554109e039177559a00def30b8fe164f34177b686becf066e76faaf849570a9c2839b830966627451f46b3a8ab829209ccb21846ae7da7904a0139e57586afcd4e70dd63c24c5a45440f60ce81922ea7ddae7e873365599e922165d80b30deed7f24c68b98279d665498963d024c240eb2f94bf38d3a3d161ec077d0dea774d954f55348c05f7d59516063f2e5e08bf85b50140123d8964826e91720cf9ab30da7c809b281a8da12b63c6e5fab7a6be8ff2fe182b6b5daec4b5ca33409b4c9cee2f160c057751700ede15c8cb79b3ab45adb964377f3b0fb45eb975075d917cb19bc83cd55afd3904555d526290570f3553b587489eb44997f5dbdaf3129373a9972ddbaa1614b271c6ad9ccbe0184241d1ddb60d7efeaec93a436df27056d1ec8c06edf023e8d1635772f11200049e02241ee00b5905fdde4758195383a81ade3c0e4ded142dc9ad3ff444c62955e86677e17023adee1ddc5f658633df51548c61bccf5ad498ca973694b49111cf33a1bb93cf85f6f55719eb6de02508e33773319db6b3bd13a40054a892a4bbf11c8fb0642e1bab3bb09bfad325afbd73b8f531c06b64821cfbd83c65c7353b845d36e586442c1edd0e8cc86a9fb86176e0047fd340fd9444ccfee254801d52771e9370b1c48b76dd0982d45e7581183004f82b500f060a127b15c5edb9429e4f53e6ac94376f93169170f64eaedb9a6db2f33b8075942c5ad4d93a998cc3b629090c79da4a6ba956c7db296170bbb5c984e52c539a77ac2a7b509811a8418e5943bf256ac2c4576628e97dfd771c570ffa7a5173614f87a9e3cad62ebbd09566fcc1cced786d6b6246d76a3e3d6500595a3c7616e5019a03881dbb527115154445960418428e29da064092e6184a01ba92b63c3f9d35e76a464c8426f7994f287f0394b6079d8e36174514f200eb0eb8c6049c86a053e1508ff09107bc3ed2a8f092dd1934a1ba1c061dee9ae67b43295c50834d3fc6a6f44257162c3bc37aa2610f993e0b14a066a6b80660616b95a00d6de8a43ec9824b722088138dd389d7b6baf96c634d906e94eaa637f9b3edce29d06747bc51fc3541f537dc48668158fda4f254ace1f2da1e8aa46dd9280f5218382386dfc2bc1965a6f0f22cea6f600f329e908b19b2bcdfd90a0d1906d30a0adf8762401cc2906b7d46d060077367454e2fd9bb0003d140d8a5b021ce64081093efa8988f821ed30c8406091d7e439a2c192d23640049ccc3612945e26ce630d19cf2086676fb3e5db383f8184ea0bcb7d51c4af73ae4498ea49e797b416907bb11e2a31cca58e4563a59b82940f61f3de60caa4d41fe2dee56183a9c902634524eac74083984b33cb1a32cf74a76cb18e352d235bbfd0d2dc4f65243a6b11593ac4ff2c9274566fa6199041d5cb22fbed116c0e90432e76cf3adc24a4742cce77a64d0e66a8b46d1506e6d35374b050e56ab74db2e0bc10a5fd694aadc615d7c7832514025bed901de248b2c9f2ee588eae711559fc69b39046673451a73583a83ae96952c2ed1a5c7c44fb75526f1b674bed1d333540061ccf5abfb75255a81cea56de75ad8ab7b713173d7f86d15896e3a1341e54af9fd6ef5c2bfe70328c680b4a4d08f7b9a64d50a6ad33bafa6563c5eb760cd9fe5bc5b2aa05028491a0d2a366cd2a01eae1fbc606e0fe23e2bd4a98a500f7e11304e9577beb9839b339554cc0e4551ca1ce841c82d50e0d6bc396a913a9ee340c54522c9ed2eb2dd2d07578187baa002499254bc8fa16b26b4aa49b4ec80ff3f8b7aec618413d622b7cc44726aa13a93237973b0ec94f238d5a901ae058b0270a8356c36e9b05f939b885b96721bcf7062d7369a990e4c3d71f6ba8346f2a6cb77df61409020cdad9ccd2d28b093a111e6244d913afd1cd12d51a6e6fc2703c11977dcc0773d867ef658fe3110ce097549383e145b2c5472ca4cd57a8660c279624fe94b5a832a11a6380f4efcd05b4bf0eaef9bdf311ff635c7560bce578c6e55a472ee103ddd458f2eb87d7b79f0381d2c8cbc3214b76e974ae7e5376fa4e1f654cfdd2fd217f2d21b7c4219d32d521eb4559f953cfd1dc84dc278300e8e1d8d7d1186aa993711a7582b73f8b199219d78c91ae23cce6e940224a278c29ee990ee31ce37d10b72e1c68cedd0b7d8e496c5d3a58bc40af5609dd9efc0ab9f67827991ad4c7dbb278a235675b73f0fb5ac5ad8982d34262aab7fda2ecc2e19dd9e26ce88de40c061d11e45ac4c6d370dc5d878665eecd3fc6b6de4ed12b5c6897ddad20fdc813fe9b8a8b677cc66b2499269e54af6af888b8c4d03730c3ed9ca7fa90ed2bf378db1ee427e27bbac1e9b7a41747478fab10f9a911f21a39b96f785f55163e0faa57731b876eda0fa865e141c68c2a66664cffc03ed8a51aecdf19ae92238b7a73a11f065ef54cd91484f5c688642b527402c7c40558f83ff1e27508caa175e7c3f25e448016748c08a288263887c5ae649dd67e4b7e2d3c5517edef9a3696a0b86e97cbe39907519e04d084c4e9fdd190f37478b51ddfc4ec808332b3c925f0e603e8bb46ae7341176bc50c342bffe2d537860f5b591139a7fd5fbce23c6c6df115431030062e86c30636ff3e25d2a4966750b1bd2322d4cacc288b239fc79350f8ac9b0e04e8e4d49e902f08abfa4ceb91593ba56bc03cfd75b7eff9fcefa55422414e8e3768edbaf3ba2b644a8e10c75ffa8a8c6c4196278967bdc82049445a74dddc7bad0b445ac7d1bd2868b61fccbd3c9d89f7214a3bb9fd5f0dddfff2ce45a27fa34fd585a231729d9fe7e640b19055dc5e076b58f0aaa9e45b4e0c5df39e7658c8e5160df4b0f11402789497d7374ec3a54d0bfd52fe0cdf55198ba382cd80c2061325cc4fe6eaa6bb5d57d21791d3363a4700019fad7a2d82a7d72f50ce252c3cd6ab12aa1e6bd88cad2ce5c2b288b4e2c9bf6c22f043a6249ec58353efbd08c69ad42adbc1d4ec4e90603954ea65656a578258756c051a1c11a2f36bc483c9809a3e9063142885c57c4c1842a6f28a29fa0fa2eb4cb63939ed73d60f54338e9300dfb128484b55797cd03217feea3ef16afa4a7b84e62713f22e8a26e471ded55133251703e6ef442e0f0674213bbc1b5cd867bce2a57ede2620ca1e6837b7f506cd9c7ed4e09bb3bd38e88b871a72b6d403c3125a3c038acbeb6f2bc0748dced9b23d32b85ec12ba2cda77eed37884ad32ecf7d6d00462a30783eef5a42d6328f4ca453343fc36b7f7fe1e0728dcf9aab2e129b59958cda36d7db7336a8323b8720148685740281adfa5b2218823a853516acf51f173689f284e0d810f718db5755b81ebb167c2dea4d3a213a5e0886e3c73932c9a16f12d5311897ecb6590e61a9106d55f0d9f419e343f6d03d38d7605f2b20f646dc4eeb6d322c2b524"}, 0x1015, 0x1) write(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:48 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x7d510e23, 0x6, 0x2, 0x3e, 0x0, 0x0, 0x38, 0x22a, 0x5, 0x7, 0x20, 0x2, 0x1ff, 0x2}, [{0x0, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc2684", [[]]}, 0x1f1) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r1, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x6f, 0x1, {0x1, [{0x14, 0x2, 0x4}]}}, 0x16) write(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:13:48 executing program 1: r0 = getpid() r1 = syz_open_procfs(0x0, &(0x7f0000000100)='sched\x00') perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x2, 0x6, 0x9, 0x1, 0x0, 0x4, 0x8, 0x0, 0x6, 0x0, 0xac, 0x81, 0xffffffffffffffff, 0x8, 0x766, 0x0, 0xfffffffffffffffb, 0x10000, 0x81, 0x1, 0x0, 0x1, 0x6, 0x5, 0xd3c, 0x3, 0x4, 0x18, 0xffffc00000000000, 0x7fff, 0x6, 0x1, 0x2, 0x2, 0x7, 0x8, 0x0, 0x101, 0x0, @perf_config_ext={0xce, 0x6}, 0x1, 0x99d, 0x80, 0x0, 0x8, 0x2, 0x400}, r0, 0x9, r1, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="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"/504], 0x1f8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$apparmor_exec(r3, &(0x7f00000002c0)=ANY=[], 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r4) 04:13:48 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x339c, 0x7d510e23, 0x6, 0x2, 0x3e, 0x7, 0xb8, 0x38, 0x22a, 0x5, 0x0, 0x20, 0x2, 0x1ff, 0x2, 0xfffffffffffff000}, [{0x4, 0x0, 0x4, 0x80000000, 0x34af, 0x80, 0xff, 0xffffffff}, {0x60000007, 0x2e0854ef, 0xfffffffffffffffc, 0x9, 0x10001, 0x9, 0x5, 0x9}], "a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e1e47bc23a2a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80da29aacb8ab876b7051c0ac53efac4aa1abf849ae9756c1e223a47a38dd9d347ea546ee00c1744d293d823e", [[]]}, 0x243) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) r1 = socket$inet(0x10, 0x2000000000000003, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'ip6erspan0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="00df3f9eb9d2e564d4221f6eaa7ad51a5ad0123e9fe9e3"]}) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00\x00\x00\x00\x00r\xed\x02\x00', @ifru_flags=0x2}) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r4 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) r5 = dup(r4) write$evdev(r5, &(0x7f0000000240)=[{{0x77359400}, 0x0, 0x0, 0x7}], 0x18) sendfile(r3, r4, 0x0, 0x20000102000007) sendfile(r4, r2, 0x0, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000100)='./bus\x00', 0x0, &(0x7f0000001c40)=ANY=[@ANYBLOB="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"], 0x1, 0x1) r6 = creat(&(0x7f0000000a00)='./bus\x00', 0x0) open(0x0, 0x40, 0x140) close(r3) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f0000002080)={{{@in6=@mcast1, @in6=@remote}}, {{@in6=@remote}, 0x0, @in=@remote}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r6, 0x8933, &(0x7f00000024c0)={'team0\x00'}) r7 = add_key$keyring(&(0x7f0000001bc0)='keyring\x00', &(0x7f0000001c00)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, 0x0, &(0x7f0000001b40)='keyring\x00', &(0x7f0000001b80)={'syz', 0x2}, r7) getdents(0xffffffffffffffff, 0x0, 0x0) r8 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r8, 0x1, 0xf, &(0x7f0000d1c000)=0x6, 0x4) bind$inet6(r8, &(0x7f0000f67fe4)={0xa, 0x4e20}, 0x1c) socket$inet6(0xa, 0x2, 0x0) 04:13:48 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x20a) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x3) ioctl$KDGKBMODE(r1, 0x4b44, &(0x7f0000000100)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) socket(0x0, 0x400000000000003, 0x0) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:13:48 executing program 4: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000000c0)) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x2c001, 0x0) write(0xffffffffffffffff, &(0x7f0000001100)="2400000021002551071cef64ff00fc020200000000100f000ee1000c08000a0000000000", 0x24) write$apparmor_exec(r0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') 04:13:48 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="7f454c4600089c23060000000000000002003e0007000000b8000000380000002a02000005000000070020000200ff01020000f00000000000000000ef54082efcffffff0900000001000100090000000500000009000000a3d371d99314c44da8835dbfc490655cdfc8c6b84a70e237e0e9c58c94504ebedf009342f2cb607adac2dcc622afe9e12a4eaadcd3ae196646c3f0096fc91efc0a6bd92ccb091619be607ecbf3fa4b34be7d977b88b708dfb52d3bd255b76e864bdf5479b018ae411fe381f262c8fbee99aeed1527fc1c6ab14270caa657bd4f82b3d833a9fc0403eaa4aed3bdf05688e12ddc26842295399491c80d00"/500], 0x1f8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2c001, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$apparmor_exec(r1, &(0x7f00000002c0)=ANY=[], 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') fcntl$dupfd(0xffffffffffffffff, 0x406, r2) [ 302.905021] audit: type=1400 audit(1560831228.497:28): avc: denied { setattr } for pid=24836 comm="syz-executor.0" name="current" dev="proc" ino=82083 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=file permissive=1 [ 303.029441] ------------[ cut here ]------------ [ 303.029478] WARNING: CPU: 1 PID: 24864 at fs/attr.c:211 notify_change2+0xae2/0xd90 [ 303.029493] Kernel panic - not syncing: panic_on_warn set ... [ 303.029493] [ 303.029507] CPU: 1 PID: 24864 Comm: syz-executor.3 Not tainted 4.9.182+ #1 [ 303.029524] ffff880191067430 ffffffff81b57e21 0000000000000000 ffffffff82a3a960 [ 303.029537] 00000000ffffffff 0000000000000001 0000000000000009 ffff880191067510 [ 303.029550] ffffffff813fd5da 0000000041b58ab3 ffffffff82e313da ffffffff813fd401 [ 303.029551] Call Trace: [ 303.029566] [<0000000062aa2c8a>] dump_stack+0xc1/0x120 [ 303.029580] [<00000000c82f9c3b>] panic+0x1d9/0x3bd [ 303.029591] [<0000000065f29bae>] ? add_taint.cold+0x16/0x16 [ 303.029602] [<00000000df3e315c>] ? __warn.cold+0x14/0x2f [ 303.029612] [<0000000067a5d274>] ? notify_change2+0xae2/0xd90 [ 303.029620] [<00000000e4818034>] __warn.cold+0x2f/0x2f [ 303.029632] [<0000000015b4bb59>] warn_slowpath_null+0x2d/0x40 [ 303.029640] [<0000000067a5d274>] notify_change2+0xae2/0xd90 [ 303.029648] [<00000000ee04d9f9>] file_remove_privs+0x285/0x4b0 [ 303.029658] [<00000000e3c86253>] ? dentry_needs_remove_privs.part.0+0x60/0x60 [ 303.029667] [<000000001737d351>] ? check_preemption_disabled+0x3c/0x200 [ 303.029678] [<0000000005911175>] ? retint_kernel+0x2d/0x2d [ 303.029687] [<0000000064b8e302>] ? __generic_file_write_iter+0x3f8/0x530 [ 303.029696] [<0000000051796856>] __generic_file_write_iter+0x157/0x530 [ 303.029705] [<000000003112b763>] blkdev_write_iter+0x1bb/0x370 [ 303.029713] [<000000007a08ad68>] ? bd_acquire+0x250/0x250 [ 303.029720] [<0000000005911175>] ? retint_kernel+0x2d/0x2d [ 303.029728] [<000000007a08ad68>] ? bd_acquire+0x250/0x250 [ 303.029736] [<00000000c118c188>] vfs_iter_write+0x2e2/0x580 [ 303.029744] [<0000000005911175>] ? retint_kernel+0x2d/0x2d [ 303.029752] [<0000000025d95bda>] ? do_iter_readv_writev+0x4b0/0x4b0 [ 303.029761] [<00000000749211ee>] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 303.029771] [<000000007091c99e>] iter_file_splice_write+0x5a9/0xb10 [ 303.029779] [<00000000760aaf81>] ? __atime_needs_update+0x950/0x950 [ 303.029788] [<00000000706a95fa>] ? vmsplice_to_user+0x1e0/0x1e0 [ 303.029795] [<0000000005911175>] ? retint_kernel+0x2d/0x2d [ 303.029805] [<00000000ef2bd40d>] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 303.029813] [<0000000005911175>] ? retint_kernel+0x2d/0x2d [ 303.029821] [<00000000706a95fa>] ? vmsplice_to_user+0x1e0/0x1e0 [ 303.029829] [<000000005708de8d>] direct_splice_actor+0x126/0x1a0 [ 303.029837] [<00000000d7a1c825>] splice_direct_to_actor+0x2c8/0x820 [ 303.029845] [<0000000012bd8b1b>] ? generic_pipe_buf_nosteal+0x10/0x10 [ 303.029853] [<0000000057eb4e16>] ? do_splice_to+0x170/0x170 [ 303.029862] [<000000001c275c78>] ? security_file_permission+0x8f/0x1f0 [ 303.029870] [<0000000040a8c22c>] ? rw_verify_area+0xea/0x2b0 [ 303.029879] [<00000000d8a273d0>] do_splice_direct+0x1a5/0x260 [ 303.029887] [<00000000c4fed64a>] ? splice_direct_to_actor+0x820/0x820 [ 303.029895] [<000000003fca7243>] ? selinux_file_permission+0x85/0x470 [ 303.029903] [<000000001c275c78>] ? security_file_permission+0x8f/0x1f0 [ 303.029911] [<0000000040a8c22c>] ? rw_verify_area+0xea/0x2b0 [ 303.029918] [<00000000163a22bb>] do_sendfile+0x503/0xc00 [ 303.029927] [<0000000073d32e90>] ? do_compat_pwritev64+0x180/0x180 [ 303.029935] [<00000000437629e3>] ? __might_fault+0x114/0x1d0 [ 303.029944] [<000000003e7c97e8>] SyS_sendfile64+0x145/0x160 [ 303.029952] [<00000000630cc76e>] ? SyS_sendfile+0x160/0x160 [ 303.029958] [<00000000a9161996>] ? do_syscall_64+0x4a/0x5c0 [ 303.029966] [<00000000630cc76e>] ? SyS_sendfile+0x160/0x160 [ 303.029974] [<000000009085c7c5>] do_syscall_64+0x1ad/0x5c0 [ 303.029982] [<000000005f479a4a>] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 303.030406] Kernel Offset: disabled [ 303.383377] Rebooting in 86400 seconds..