0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:29:54 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:29:54 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)}, &(0x7f00000001c0)) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:29:54 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:29:54 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)}, &(0x7f00000001c0)) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:29:54 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:29:54 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:29:54 executing program 2: mlockall(0x0) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) lsetxattr$system_posix_acl(&(0x7f0000000480)='./file0\x00', &(0x7f00000009c0)="737973744fb01b40c828dc1226b337d4ee706f730700000063ffff61636365737300091bc1e89c476203285014056fad00000000000000000010000000000000002244fa25752208beb14ad0b0a2077963e32960a27a2a99fddf4d05fd174f9a40ac9f4d7e80325947832bd896ac727306cb58291a24e1c7a299f5129c96f7e03918e2b83b3371a7fe20e76a885a4be036ccbce2644819dc2bd529cb5ee15f20a26b", &(0x7f00000005c0)=ANY=[], 0x0, 0x0) clock_settime(0x0, &(0x7f00000001c0)={0x0, 0x989680}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:29:54 executing program 1: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) lsetxattr$system_posix_acl(&(0x7f0000000480)='./file0\x00', &(0x7f00000009c0)="737973744fb01b40c828dc1226b337d4ee706f730700000063ffff61636365737300091bc1e89c476203285014056fad00000000000000000010000000000000002244fa25752208beb14ad0b0a2077963e32960a27a2a99fddf4d05fd174f9a40ac9f4d7e80325947832bd896ac727306cb58291a24e1c7a299f5129c96f7e03918e2b83b3371a7fe20e76a885a4be036ccbce2644819dc2bd529cb5ee15f20a26b", &(0x7f00000005c0)=ANY=[], 0x0, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:29:54 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)}, &(0x7f00000001c0)) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:29:54 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:29:54 executing program 5: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:29:54 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)}, &(0x7f00000001c0)) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:29:54 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:29:54 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)}, &(0x7f00000001c0)) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:29:54 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)}, &(0x7f00000001c0)) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:29:54 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:29:55 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:29:55 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:29:55 executing program 2: mlockall(0x0) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) lsetxattr$system_posix_acl(&(0x7f0000000480)='./file0\x00', &(0x7f00000009c0)="737973744fb01b40c828dc1226b337d4ee706f730700000063ffff61636365737300091bc1e89c476203285014056fad00000000000000000010000000000000002244fa25752208beb14ad0b0a2077963e32960a27a2a99fddf4d05fd174f9a40ac9f4d7e80325947832bd896ac727306cb58291a24e1c7a299f5129c96f7e03918e2b83b3371a7fe20e76a885a4be036ccbce2644819dc2bd529cb5ee15f20a26b", &(0x7f00000005c0)=ANY=[], 0x0, 0x0) clock_settime(0x0, &(0x7f00000001c0)={0x0, 0x989680}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:29:55 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)}, &(0x7f00000001c0)) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:29:55 executing program 1: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) lsetxattr$system_posix_acl(&(0x7f0000000480)='./file0\x00', &(0x7f00000009c0)="737973744fb01b40c828dc1226b337d4ee706f730700000063ffff61636365737300091bc1e89c476203285014056fad00000000000000000010000000000000002244fa25752208beb14ad0b0a2077963e32960a27a2a99fddf4d05fd174f9a40ac9f4d7e80325947832bd896ac727306cb58291a24e1c7a299f5129c96f7e03918e2b83b3371a7fe20e76a885a4be036ccbce2644819dc2bd529cb5ee15f20a26b", &(0x7f00000005c0)=ANY=[], 0x0, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:29:55 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:29:55 executing program 5: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:29:55 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)}, &(0x7f00000001c0)) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:29:55 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)}, &(0x7f00000001c0)) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:29:55 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)}, &(0x7f00000001c0)) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:29:55 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)}, &(0x7f00000001c0)) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:29:55 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:29:56 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:29:56 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)}, &(0x7f00000001c0)) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") [ 529.895261] audit: type=1326 audit(1536960596.292:98): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=13014 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 21:29:56 executing program 2: mlockall(0x0) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) lsetxattr$system_posix_acl(&(0x7f0000000480)='./file0\x00', &(0x7f00000009c0)="737973744fb01b40c828dc1226b337d4ee706f730700000063ffff61636365737300091bc1e89c476203285014056fad00000000000000000010000000000000002244fa25752208beb14ad0b0a2077963e32960a27a2a99fddf4d05fd174f9a40ac9f4d7e80325947832bd896ac727306cb58291a24e1c7a299f5129c96f7e03918e2b83b3371a7fe20e76a885a4be036ccbce2644819dc2bd529cb5ee15f20a26b", &(0x7f00000005c0)=ANY=[], 0x0, 0x0) clock_settime(0x0, &(0x7f00000001c0)={0x0, 0x989680}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:29:56 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:29:56 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)}, &(0x7f00000001c0)) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:29:56 executing program 1: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) lsetxattr$system_posix_acl(&(0x7f0000000480)='./file0\x00', &(0x7f00000009c0)="737973744fb01b40c828dc1226b337d4ee706f730700000063ffff61636365737300091bc1e89c476203285014056fad00000000000000000010000000000000002244fa25752208beb14ad0b0a2077963e32960a27a2a99fddf4d05fd174f9a40ac9f4d7e80325947832bd896ac727306cb58291a24e1c7a299f5129c96f7e03918e2b83b3371a7fe20e76a885a4be036ccbce2644819dc2bd529cb5ee15f20a26b", &(0x7f00000005c0)=ANY=[], 0x0, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:29:56 executing program 5: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") [ 530.287445] audit: type=1326 audit(1536960596.682:99): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=13035 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 21:29:56 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)}, &(0x7f00000001c0)) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:29:56 executing program 1: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) lsetxattr$system_posix_acl(&(0x7f0000000480)='./file0\x00', &(0x7f00000009c0)="737973744fb01b40c828dc1226b337d4ee706f730700000063ffff61636365737300091bc1e89c476203285014056fad00000000000000000010000000000000002244fa25752208beb14ad0b0a2077963e32960a27a2a99fddf4d05fd174f9a40ac9f4d7e80325947832bd896ac727306cb58291a24e1c7a299f5129c96f7e03918e2b83b3371a7fe20e76a885a4be036ccbce2644819dc2bd529cb5ee15f20a26b", &(0x7f00000005c0)=ANY=[], 0x0, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") [ 530.437985] audit: type=1326 audit(1536960596.832:100): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=13039 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 21:29:56 executing program 2: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) lsetxattr$system_posix_acl(&(0x7f0000000480)='./file0\x00', &(0x7f00000009c0)="737973744fb01b40c828dc1226b337d4ee706f730700000063ffff61636365737300091bc1e89c476203285014056fad00000000000000000010000000000000002244fa25752208beb14ad0b0a2077963e32960a27a2a99fddf4d05fd174f9a40ac9f4d7e80325947832bd896ac727306cb58291a24e1c7a299f5129c96f7e03918e2b83b3371a7fe20e76a885a4be036ccbce2644819dc2bd529cb5ee15f20a26b", &(0x7f00000005c0)=ANY=[], 0x0, 0x0) clock_settime(0x0, &(0x7f00000001c0)={0x0, 0x989680}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:29:57 executing program 2: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) lsetxattr$system_posix_acl(&(0x7f0000000480)='./file0\x00', &(0x7f00000009c0)="737973744fb01b40c828dc1226b337d4ee706f730700000063ffff61636365737300091bc1e89c476203285014056fad00000000000000000010000000000000002244fa25752208beb14ad0b0a2077963e32960a27a2a99fddf4d05fd174f9a40ac9f4d7e80325947832bd896ac727306cb58291a24e1c7a299f5129c96f7e03918e2b83b3371a7fe20e76a885a4be036ccbce2644819dc2bd529cb5ee15f20a26b", &(0x7f00000005c0)=ANY=[], 0x0, 0x0) clock_settime(0x0, &(0x7f00000001c0)={0x0, 0x989680}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:29:57 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)}, &(0x7f00000001c0)) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0x0, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:29:57 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:29:57 executing program 2: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) lsetxattr$system_posix_acl(&(0x7f0000000480)='./file0\x00', &(0x7f00000009c0)="737973744fb01b40c828dc1226b337d4ee706f730700000063ffff61636365737300091bc1e89c476203285014056fad00000000000000000010000000000000002244fa25752208beb14ad0b0a2077963e32960a27a2a99fddf4d05fd174f9a40ac9f4d7e80325947832bd896ac727306cb58291a24e1c7a299f5129c96f7e03918e2b83b3371a7fe20e76a885a4be036ccbce2644819dc2bd529cb5ee15f20a26b", &(0x7f00000005c0)=ANY=[], 0x0, 0x0) clock_settime(0x0, &(0x7f00000001c0)={0x0, 0x989680}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:29:57 executing program 2: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) lsetxattr$system_posix_acl(&(0x7f0000000480)='./file0\x00', &(0x7f00000009c0)="737973744fb01b40c828dc1226b337d4ee706f730700000063ffff61636365737300091bc1e89c476203285014056fad00000000000000000010000000000000002244fa25752208beb14ad0b0a2077963e32960a27a2a99fddf4d05fd174f9a40ac9f4d7e80325947832bd896ac727306cb58291a24e1c7a299f5129c96f7e03918e2b83b3371a7fe20e76a885a4be036ccbce2644819dc2bd529cb5ee15f20a26b", &(0x7f00000005c0)=ANY=[], 0x0, 0x0) clock_settime(0x0, &(0x7f00000001c0)={0x0, 0x989680}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:29:57 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:29:57 executing program 2: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) lsetxattr$system_posix_acl(&(0x7f0000000480)='./file0\x00', &(0x7f00000009c0)="737973744fb01b40c828dc1226b337d4ee706f730700000063ffff61636365737300091bc1e89c476203285014056fad00000000000000000010000000000000002244fa25752208beb14ad0b0a2077963e32960a27a2a99fddf4d05fd174f9a40ac9f4d7e80325947832bd896ac727306cb58291a24e1c7a299f5129c96f7e03918e2b83b3371a7fe20e76a885a4be036ccbce2644819dc2bd529cb5ee15f20a26b", &(0x7f00000005c0)=ANY=[], 0x0, 0x0) clock_settime(0x0, &(0x7f00000001c0)={0x0, 0x989680}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:29:57 executing program 5: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:29:57 executing program 2: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) lsetxattr$system_posix_acl(&(0x7f0000000480)='./file0\x00', &(0x7f00000009c0)="737973744fb01b40c828dc1226b337d4ee706f730700000063ffff61636365737300091bc1e89c476203285014056fad00000000000000000010000000000000002244fa25752208beb14ad0b0a2077963e32960a27a2a99fddf4d05fd174f9a40ac9f4d7e80325947832bd896ac727306cb58291a24e1c7a299f5129c96f7e03918e2b83b3371a7fe20e76a885a4be036ccbce2644819dc2bd529cb5ee15f20a26b", &(0x7f00000005c0)=ANY=[], 0x0, 0x0) clock_settime(0x0, &(0x7f00000001c0)={0x0, 0x989680}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:29:57 executing program 2: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) lsetxattr$system_posix_acl(&(0x7f0000000480)='./file0\x00', &(0x7f00000009c0)="737973744fb01b40c828dc1226b337d4ee706f730700000063ffff61636365737300091bc1e89c476203285014056fad00000000000000000010000000000000002244fa25752208beb14ad0b0a2077963e32960a27a2a99fddf4d05fd174f9a40ac9f4d7e80325947832bd896ac727306cb58291a24e1c7a299f5129c96f7e03918e2b83b3371a7fe20e76a885a4be036ccbce2644819dc2bd529cb5ee15f20a26b", &(0x7f00000005c0)=ANY=[], 0x0, 0x0) clock_settime(0x0, &(0x7f00000001c0)={0x0, 0x989680}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:29:57 executing program 1: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) lsetxattr$system_posix_acl(&(0x7f0000000480)='./file0\x00', &(0x7f00000009c0)="737973744fb01b40c828dc1226b337d4ee706f730700000063ffff61636365737300091bc1e89c476203285014056fad00000000000000000010000000000000002244fa25752208beb14ad0b0a2077963e32960a27a2a99fddf4d05fd174f9a40ac9f4d7e80325947832bd896ac727306cb58291a24e1c7a299f5129c96f7e03918e2b83b3371a7fe20e76a885a4be036ccbce2644819dc2bd529cb5ee15f20a26b", &(0x7f00000005c0)=ANY=[], 0x0, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:29:57 executing program 2: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) lsetxattr$system_posix_acl(&(0x7f0000000480)='./file0\x00', &(0x7f00000009c0)="737973744fb01b40c828dc1226b337d4ee706f730700000063ffff61636365737300091bc1e89c476203285014056fad00000000000000000010000000000000002244fa25752208beb14ad0b0a2077963e32960a27a2a99fddf4d05fd174f9a40ac9f4d7e80325947832bd896ac727306cb58291a24e1c7a299f5129c96f7e03918e2b83b3371a7fe20e76a885a4be036ccbce2644819dc2bd529cb5ee15f20a26b", &(0x7f00000005c0)=ANY=[], 0x0, 0x0) clock_settime(0x0, &(0x7f00000001c0)={0x0, 0x989680}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:29:57 executing program 1: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) lsetxattr$system_posix_acl(&(0x7f0000000480)='./file0\x00', &(0x7f00000009c0)="737973744fb01b40c828dc1226b337d4ee706f730700000063ffff61636365737300091bc1e89c476203285014056fad00000000000000000010000000000000002244fa25752208beb14ad0b0a2077963e32960a27a2a99fddf4d05fd174f9a40ac9f4d7e80325947832bd896ac727306cb58291a24e1c7a299f5129c96f7e03918e2b83b3371a7fe20e76a885a4be036ccbce2644819dc2bd529cb5ee15f20a26b", &(0x7f00000005c0)=ANY=[], 0x0, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:29:57 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)}, &(0x7f00000001c0)) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0x0, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:29:57 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:29:57 executing program 2: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) lsetxattr$system_posix_acl(&(0x7f0000000480)='./file0\x00', &(0x7f00000009c0)="737973744fb01b40c828dc1226b337d4ee706f730700000063ffff61636365737300091bc1e89c476203285014056fad00000000000000000010000000000000002244fa25752208beb14ad0b0a2077963e32960a27a2a99fddf4d05fd174f9a40ac9f4d7e80325947832bd896ac727306cb58291a24e1c7a299f5129c96f7e03918e2b83b3371a7fe20e76a885a4be036ccbce2644819dc2bd529cb5ee15f20a26b", &(0x7f00000005c0)=ANY=[], 0x0, 0x0) clock_settime(0x0, &(0x7f00000001c0)={0x0, 0x989680}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:29:57 executing program 1: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) lsetxattr$system_posix_acl(&(0x7f0000000480)='./file0\x00', &(0x7f00000009c0)="737973744fb01b40c828dc1226b337d4ee706f730700000063ffff61636365737300091bc1e89c476203285014056fad00000000000000000010000000000000002244fa25752208beb14ad0b0a2077963e32960a27a2a99fddf4d05fd174f9a40ac9f4d7e80325947832bd896ac727306cb58291a24e1c7a299f5129c96f7e03918e2b83b3371a7fe20e76a885a4be036ccbce2644819dc2bd529cb5ee15f20a26b", &(0x7f00000005c0)=ANY=[], 0x0, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:29:58 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:29:58 executing program 1: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) lsetxattr$system_posix_acl(&(0x7f0000000480)='./file0\x00', &(0x7f00000009c0)="737973744fb01b40c828dc1226b337d4ee706f730700000063ffff61636365737300091bc1e89c476203285014056fad00000000000000000010000000000000002244fa25752208beb14ad0b0a2077963e32960a27a2a99fddf4d05fd174f9a40ac9f4d7e80325947832bd896ac727306cb58291a24e1c7a299f5129c96f7e03918e2b83b3371a7fe20e76a885a4be036ccbce2644819dc2bd529cb5ee15f20a26b", &(0x7f00000005c0)=ANY=[], 0x0, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:29:58 executing program 2: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) lsetxattr$system_posix_acl(&(0x7f0000000480)='./file0\x00', &(0x7f00000009c0)="737973744fb01b40c828dc1226b337d4ee706f730700000063ffff61636365737300091bc1e89c476203285014056fad00000000000000000010000000000000002244fa25752208beb14ad0b0a2077963e32960a27a2a99fddf4d05fd174f9a40ac9f4d7e80325947832bd896ac727306cb58291a24e1c7a299f5129c96f7e03918e2b83b3371a7fe20e76a885a4be036ccbce2644819dc2bd529cb5ee15f20a26b", &(0x7f00000005c0)=ANY=[], 0x0, 0x0) clock_settime(0x0, &(0x7f00000001c0)={0x0, 0x989680}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:29:58 executing program 5: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") [ 532.108127] audit: type=1326 audit(1536960598.502:101): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=13108 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 21:29:58 executing program 2: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) lsetxattr$system_posix_acl(&(0x7f0000000480)='./file0\x00', &(0x7f00000009c0)="737973744fb01b40c828dc1226b337d4ee706f730700000063ffff61636365737300091bc1e89c476203285014056fad00000000000000000010000000000000002244fa25752208beb14ad0b0a2077963e32960a27a2a99fddf4d05fd174f9a40ac9f4d7e80325947832bd896ac727306cb58291a24e1c7a299f5129c96f7e03918e2b83b3371a7fe20e76a885a4be036ccbce2644819dc2bd529cb5ee15f20a26b", &(0x7f00000005c0)=ANY=[], 0x0, 0x0) clock_settime(0x0, &(0x7f00000001c0)={0x0, 0x989680}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:29:58 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") [ 532.267475] audit: type=1326 audit(1536960598.663:102): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=13120 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 21:29:58 executing program 2: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) lsetxattr$system_posix_acl(&(0x7f0000000480)='./file0\x00', &(0x7f00000009c0)="737973744fb01b40c828dc1226b337d4ee706f730700000063ffff61636365737300091bc1e89c476203285014056fad00000000000000000010000000000000002244fa25752208beb14ad0b0a2077963e32960a27a2a99fddf4d05fd174f9a40ac9f4d7e80325947832bd896ac727306cb58291a24e1c7a299f5129c96f7e03918e2b83b3371a7fe20e76a885a4be036ccbce2644819dc2bd529cb5ee15f20a26b", &(0x7f00000005c0)=ANY=[], 0x0, 0x0) clock_settime(0x0, &(0x7f00000001c0)={0x0, 0x989680}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:29:58 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:29:58 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)}, &(0x7f00000001c0)) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") [ 532.458995] audit: type=1326 audit(1536960598.846:103): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=13127 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 21:29:58 executing program 2: clock_getres(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f0000000080)) pipe(&(0x7f0000000040)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000380)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000003c0)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000400), &(0x7f0000000580)=0x10) gettid() init_module(&(0x7f00000004c0)='%]cgroup#selinuxem0/em1[\x00', 0x19, &(0x7f0000000500)='$,\x00') gettid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000540)) getpgid(0x0) wait4(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000200)) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a03b6969ef69dc00d9fbfb69203737c3397c05f3af1a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501eee00885c4227992dd289f9f") readlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=""/140, 0x8c) pipe2(&(0x7f00000000c0), 0x0) syz_genetlink_get_family_id$team(&(0x7f00000006c0)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000e40)={{{@in=@multicast2, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@remote}}, &(0x7f0000000f40)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000fc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001000)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001040)={{{@in6=@remote, @in=@local}}, {{@in=@multicast1}}}, &(0x7f0000001140)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f00000013c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001400)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001440)={@mcast1}, &(0x7f0000001480)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000014c0)={0x0, @local, @rand_addr}, &(0x7f0000001500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000015c0)=0x14, 0x0) 21:29:59 executing program 5: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:29:59 executing program 1: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) lsetxattr$system_posix_acl(&(0x7f0000000480)='./file0\x00', &(0x7f00000009c0)="737973744fb01b40c828dc1226b337d4ee706f730700000063ffff61636365737300091bc1e89c476203285014056fad00000000000000000010000000000000002244fa25752208beb14ad0b0a2077963e32960a27a2a99fddf4d05fd174f9a40ac9f4d7e80325947832bd896ac727306cb58291a24e1c7a299f5129c96f7e03918e2b83b3371a7fe20e76a885a4be036ccbce2644819dc2bd529cb5ee15f20a26b", &(0x7f00000005c0)=ANY=[], 0x0, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:29:59 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:29:59 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:29:59 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)}, &(0x7f00000001c0)) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:29:59 executing program 2: 21:29:59 executing program 2: 21:29:59 executing program 2: 21:30:00 executing program 2: 21:30:00 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000340)) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f00000003c0)) clock_gettime(0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="af8055a0596969ef69dc00d99066410f60bad33f00007c2aaf200f382143fd64a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e6989f") openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000180)="42805da0be0fef69dc0f01eece73fe95fa380f38217f1af3f3817e768cc80000000081b5e5b42b00000021abf00fbab204000000cafc205bdae5e54175450f2e1ac4010d64ac1e5d31a3b73e670f530c2771fb0703") 21:30:00 executing program 5: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:00 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) clone(0x210007fa, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000340)={'lo\x00', &(0x7f0000000080)=@ethtool_cmd={0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x2]}}) 21:30:00 executing program 5: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:00 executing program 1: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) lsetxattr$system_posix_acl(&(0x7f0000000480)='./file0\x00', &(0x7f00000009c0)="737973744fb01b40c828dc1226b337d4ee706f730700000063ffff61636365737300091bc1e89c476203285014056fad00000000000000000010000000000000002244fa25752208beb14ad0b0a2077963e32960a27a2a99fddf4d05fd174f9a40ac9f4d7e80325947832bd896ac727306cb58291a24e1c7a299f5129c96f7e03918e2b83b3371a7fe20e76a885a4be036ccbce2644819dc2bd529cb5ee15f20a26b", &(0x7f00000005c0)=ANY=[], 0x0, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:00 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:00 executing program 5: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:00 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)}, &(0x7f00000001c0)) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:00 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:00 executing program 5: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:01 executing program 2: 21:30:01 executing program 2: 21:30:01 executing program 2: 21:30:01 executing program 2: 21:30:01 executing program 2: 21:30:01 executing program 2: 21:30:01 executing program 1: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) lsetxattr$system_posix_acl(&(0x7f0000000480)='./file0\x00', &(0x7f00000009c0)="737973744fb01b40c828dc1226b337d4ee706f730700000063ffff61636365737300091bc1e89c476203285014056fad00000000000000000010000000000000002244fa25752208beb14ad0b0a2077963e32960a27a2a99fddf4d05fd174f9a40ac9f4d7e80325947832bd896ac727306cb58291a24e1c7a299f5129c96f7e03918e2b83b3371a7fe20e76a885a4be036ccbce2644819dc2bd529cb5ee15f20a26b", &(0x7f00000005c0)=ANY=[], 0x0, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:01 executing program 2: 21:30:01 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:01 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)}, &(0x7f00000001c0)) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240)={0x0, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:01 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:01 executing program 5: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:01 executing program 2: 21:30:01 executing program 2: 21:30:01 executing program 2: 21:30:01 executing program 2: 21:30:01 executing program 2: 21:30:01 executing program 2: 21:30:02 executing program 1: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) lsetxattr$system_posix_acl(&(0x7f0000000480)='./file0\x00', &(0x7f00000009c0)="737973744fb01b40c828dc1226b337d4ee706f730700000063ffff61636365737300091bc1e89c476203285014056fad00000000000000000010000000000000002244fa25752208beb14ad0b0a2077963e32960a27a2a99fddf4d05fd174f9a40ac9f4d7e80325947832bd896ac727306cb58291a24e1c7a299f5129c96f7e03918e2b83b3371a7fe20e76a885a4be036ccbce2644819dc2bd529cb5ee15f20a26b", &(0x7f00000005c0)=ANY=[], 0x0, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:02 executing program 2: 21:30:02 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:02 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:02 executing program 5: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:02 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)}, &(0x7f00000001c0)) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240)={0x0, 0x0, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:02 executing program 2: 21:30:02 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:02 executing program 2: 21:30:02 executing program 1: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) lsetxattr$system_posix_acl(&(0x7f0000000480)='./file0\x00', &(0x7f00000009c0)="737973744fb01b40c828dc1226b337d4ee706f730700000063ffff61636365737300091bc1e89c476203285014056fad00000000000000000010000000000000002244fa25752208beb14ad0b0a2077963e32960a27a2a99fddf4d05fd174f9a40ac9f4d7e80325947832bd896ac727306cb58291a24e1c7a299f5129c96f7e03918e2b83b3371a7fe20e76a885a4be036ccbce2644819dc2bd529cb5ee15f20a26b", &(0x7f00000005c0)=ANY=[], 0x0, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:02 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:02 executing program 2: 21:30:02 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:02 executing program 2: 21:30:03 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:03 executing program 2: 21:30:03 executing program 5: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:03 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)}, &(0x7f00000001c0)) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240)={0x0, 0x0, 0x0, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:03 executing program 2: 21:30:03 executing program 4: io_setup(0x0, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:03 executing program 2: 21:30:03 executing program 1: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) lsetxattr$system_posix_acl(&(0x7f0000000480)='./file0\x00', &(0x7f00000009c0)="737973744fb01b40c828dc1226b337d4ee706f730700000063ffff61636365737300091bc1e89c476203285014056fad00000000000000000010000000000000002244fa25752208beb14ad0b0a2077963e32960a27a2a99fddf4d05fd174f9a40ac9f4d7e80325947832bd896ac727306cb58291a24e1c7a299f5129c96f7e03918e2b83b3371a7fe20e76a885a4be036ccbce2644819dc2bd529cb5ee15f20a26b", &(0x7f00000005c0)=ANY=[], 0x0, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:03 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:03 executing program 2: 21:30:03 executing program 5: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:03 executing program 2: 21:30:03 executing program 2: 21:30:03 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000480)}) socket$inet_tcp(0x2, 0x1, 0x0) open(&(0x7f0000000500)='./file0\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000840)='/dev/zero\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='cgroup.controllers\x00', 0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/status\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000080), &(0x7f00000000c0)=0x10) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) epoll_create(0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/uinput\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000600)='keyring\x00', &(0x7f0000000640), 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000006c0)='encrypted\x00', &(0x7f0000000700), 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000780), 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000800)='id_legacy\x00', &(0x7f0000000900), &(0x7f0000000940), 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000680)='keyring\x00', &(0x7f00000007c0), 0x0, 0x0, 0x0) keyctl$update(0x2, 0x0, &(0x7f0000000600), 0x0) clock_getres(0x0, &(0x7f00000001c0)) ustat(0x0, &(0x7f0000000140)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0xffffffffffffffff}, 0xfffffffffffffebd) dup(0xffffffffffffffff) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) seccomp(0x1, 0x0, &(0x7f0000000440)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000480), 0xfffffffffffffd93) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000ac0)={{{@in6, @in6=@dev}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000bc0)=0xe64f4315b0b06b47) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000940)) getpgrp(0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000540)) syz_open_procfs(0x0, &(0x7f0000000340)='net/raw\x00') ioctl$RTC_VL_CLR(0xffffffffffffffff, 0x7014) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000240)) 21:30:04 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)}, &(0x7f00000001c0)) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:04 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:04 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:04 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:04 executing program 5: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:04 executing program 1: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) lsetxattr$system_posix_acl(&(0x7f0000000480)='./file0\x00', &(0x7f00000009c0)="737973744fb01b40c828dc1226b337d4ee706f730700000063ffff61636365737300091bc1e89c476203285014056fad00000000000000000010000000000000002244fa25752208beb14ad0b0a2077963e32960a27a2a99fddf4d05fd174f9a40ac9f4d7e80325947832bd896ac727306cb58291a24e1c7a299f5129c96f7e03918e2b83b3371a7fe20e76a885a4be036ccbce2644819dc2bd529cb5ee15f20a26b", &(0x7f00000005c0)=ANY=[], 0x0, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:04 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000480)}) socket$inet_tcp(0x2, 0x1, 0x0) open(&(0x7f0000000500)='./file0\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000840)='/dev/zero\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='cgroup.controllers\x00', 0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/status\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000080), &(0x7f00000000c0)=0x10) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) epoll_create(0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/uinput\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000600)='keyring\x00', &(0x7f0000000640), 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000006c0)='encrypted\x00', &(0x7f0000000700), 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000780), 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000800)='id_legacy\x00', &(0x7f0000000900), &(0x7f0000000940), 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000680)='keyring\x00', &(0x7f00000007c0), 0x0, 0x0, 0x0) keyctl$update(0x2, 0x0, &(0x7f0000000600), 0x0) clock_getres(0x0, &(0x7f00000001c0)) ustat(0x0, &(0x7f0000000140)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0xffffffffffffffff}, 0xfffffffffffffebd) dup(0xffffffffffffffff) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) seccomp(0x1, 0x0, &(0x7f0000000440)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000480), 0xfffffffffffffd93) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000ac0)={{{@in6, @in6=@dev}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000bc0)=0xe64f4315b0b06b47) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000940)) getpgrp(0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000540)) syz_open_procfs(0x0, &(0x7f0000000340)='net/raw\x00') ioctl$RTC_VL_CLR(0xffffffffffffffff, 0x7014) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000240)) 21:30:04 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:05 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:05 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:05 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:05 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:05 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)}, &(0x7f00000001c0)) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:05 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:05 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:05 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:05 executing program 5: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:05 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:05 executing program 2: syz_open_procfs$namespace(0x0, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) getresuid(&(0x7f00000000c0), &(0x7f0000000180), &(0x7f0000000240)) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f0000000300)) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f0000000140)) syz_execute_func(&(0x7f00000001c0)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 21:30:05 executing program 1: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) lsetxattr$system_posix_acl(&(0x7f0000000480)='./file0\x00', &(0x7f00000009c0)="737973744fb01b40c828dc1226b337d4ee706f730700000063ffff61636365737300091bc1e89c476203285014056fad00000000000000000010000000000000002244fa25752208beb14ad0b0a2077963e32960a27a2a99fddf4d05fd174f9a40ac9f4d7e80325947832bd896ac727306cb58291a24e1c7a299f5129c96f7e03918e2b83b3371a7fe20e76a885a4be036ccbce2644819dc2bd529cb5ee15f20a26b", &(0x7f00000005c0)=ANY=[], 0x0, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:05 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:05 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:05 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") [ 539.363653] audit: type=1326 audit(1536960605.765:104): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=13403 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 21:30:05 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") [ 539.591937] audit: type=1326 audit(1536960605.995:105): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=13408 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 21:30:06 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)}, &(0x7f00000001c0)) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:06 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") [ 539.817684] audit: type=1326 audit(1536960606.215:106): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=13415 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 21:30:06 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:06 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0x0, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:06 executing program 5: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:06 executing program 2: sysinfo(&(0x7f0000000940)=""/100) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200), &(0x7f0000000240)='rxrpc\x00', 0x0) keyctl$revoke(0x3, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f00000000c0)) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$packet(0x11, 0x0, 0x300) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 21:30:06 executing program 1: mlockall(0xfffffffffffffffc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) lsetxattr$system_posix_acl(&(0x7f0000000480)='./file0\x00', &(0x7f00000009c0)="737973744fb01b40c828dc1226b337d4ee706f730700000063ffff61636365737300091bc1e89c476203285014056fad00000000000000000010000000000000002244fa25752208beb14ad0b0a2077963e32960a27a2a99fddf4d05fd174f9a40ac9f4d7e80325947832bd896ac727306cb58291a24e1c7a299f5129c96f7e03918e2b83b3371a7fe20e76a885a4be036ccbce2644819dc2bd529cb5ee15f20a26b", &(0x7f00000005c0)=ANY=[], 0x0, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:07 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)}, &(0x7f00000001c0)) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:07 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:07 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0x0, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:07 executing program 5: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:07 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0x0, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:07 executing program 1: mlockall(0xfffffffffffffffc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) lsetxattr$system_posix_acl(&(0x7f0000000480)='./file0\x00', &(0x7f00000009c0)="737973744fb01b40c828dc1226b337d4ee706f730700000063ffff61636365737300091bc1e89c476203285014056fad00000000000000000010000000000000002244fa25752208beb14ad0b0a2077963e32960a27a2a99fddf4d05fd174f9a40ac9f4d7e80325947832bd896ac727306cb58291a24e1c7a299f5129c96f7e03918e2b83b3371a7fe20e76a885a4be036ccbce2644819dc2bd529cb5ee15f20a26b", &(0x7f00000005c0)=ANY=[], 0x0, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:07 executing program 2: sysinfo(&(0x7f0000000940)=""/100) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200), &(0x7f0000000240)='rxrpc\x00', 0x0) keyctl$revoke(0x3, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f00000000c0)) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$packet(0x11, 0x0, 0x300) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 21:30:08 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)}, &(0x7f00000001c0)) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:08 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:08 executing program 5: mlockall(0xfffffffffffffffc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:08 executing program 1: mlockall(0xfffffffffffffffc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) lsetxattr$system_posix_acl(&(0x7f0000000480)='./file0\x00', &(0x7f00000009c0)="737973744fb01b40c828dc1226b337d4ee706f730700000063ffff61636365737300091bc1e89c476203285014056fad00000000000000000010000000000000002244fa25752208beb14ad0b0a2077963e32960a27a2a99fddf4d05fd174f9a40ac9f4d7e80325947832bd896ac727306cb58291a24e1c7a299f5129c96f7e03918e2b83b3371a7fe20e76a885a4be036ccbce2644819dc2bd529cb5ee15f20a26b", &(0x7f00000005c0)=ANY=[], 0x0, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:08 executing program 2: munlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) getsockname(0xffffffffffffffff, &(0x7f00000001c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000040)=0x80) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) add_key(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000300), &(0x7f00000003c0), 0x0, 0xfffffffffffffff9) keyctl$revoke(0x3, 0x0) syz_open_procfs(0x0, &(0x7f0000000340)='schedstat\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f00000002c0)='./file0\x00'}, 0x10) setitimer(0x0, &(0x7f0000000500)={{0x77359400}, {0x77359400}}, &(0x7f0000000140)) recvmmsg(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000047c0)={0x77359400}) pipe(&(0x7f0000000180)) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 21:30:08 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:08 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:08 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)}, &(0x7f00000001c0)) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)={0x0, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:09 executing program 5: mlockall(0xfffffffffffffffc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:09 executing program 2: munlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) getsockname(0xffffffffffffffff, &(0x7f00000001c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000040)=0x80) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) add_key(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000300), &(0x7f00000003c0), 0x0, 0xfffffffffffffff9) keyctl$revoke(0x3, 0x0) syz_open_procfs(0x0, &(0x7f0000000340)='schedstat\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f00000002c0)='./file0\x00'}, 0x10) setitimer(0x0, &(0x7f0000000500)={{0x77359400}, {0x77359400}}, &(0x7f0000000140)) recvmmsg(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000047c0)={0x77359400}) pipe(&(0x7f0000000180)) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 21:30:09 executing program 1: mlockall(0x0) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) lsetxattr$system_posix_acl(&(0x7f0000000480)='./file0\x00', &(0x7f00000009c0)="737973744fb01b40c828dc1226b337d4ee706f730700000063ffff61636365737300091bc1e89c476203285014056fad00000000000000000010000000000000002244fa25752208beb14ad0b0a2077963e32960a27a2a99fddf4d05fd174f9a40ac9f4d7e80325947832bd896ac727306cb58291a24e1c7a299f5129c96f7e03918e2b83b3371a7fe20e76a885a4be036ccbce2644819dc2bd529cb5ee15f20a26b", &(0x7f00000005c0)=ANY=[], 0x0, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:09 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:09 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:09 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)}, &(0x7f00000001c0)) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)={0x0, 0x0, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:10 executing program 5: mlockall(0xfffffffffffffffc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:10 executing program 2: munlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) getsockname(0xffffffffffffffff, &(0x7f00000001c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000040)=0x80) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) add_key(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000300), &(0x7f00000003c0), 0x0, 0xfffffffffffffff9) keyctl$revoke(0x3, 0x0) syz_open_procfs(0x0, &(0x7f0000000340)='schedstat\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f00000002c0)='./file0\x00'}, 0x10) setitimer(0x0, &(0x7f0000000500)={{0x77359400}, {0x77359400}}, &(0x7f0000000140)) recvmmsg(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000047c0)={0x77359400}) pipe(&(0x7f0000000180)) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 21:30:10 executing program 1: mlockall(0x0) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) lsetxattr$system_posix_acl(&(0x7f0000000480)='./file0\x00', &(0x7f00000009c0)="737973744fb01b40c828dc1226b337d4ee706f730700000063ffff61636365737300091bc1e89c476203285014056fad00000000000000000010000000000000002244fa25752208beb14ad0b0a2077963e32960a27a2a99fddf4d05fd174f9a40ac9f4d7e80325947832bd896ac727306cb58291a24e1c7a299f5129c96f7e03918e2b83b3371a7fe20e76a885a4be036ccbce2644819dc2bd529cb5ee15f20a26b", &(0x7f00000005c0)=ANY=[], 0x0, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:10 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:10 executing program 0: mlockall(0xfffffffffffffffc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:10 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)}, &(0x7f00000001c0)) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)={0x0, 0x0, 0x0, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:10 executing program 5: mlockall(0x0) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:11 executing program 2: munlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) getsockname(0xffffffffffffffff, &(0x7f00000001c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000040)=0x80) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) add_key(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000300), &(0x7f00000003c0), 0x0, 0xfffffffffffffff9) keyctl$revoke(0x3, 0x0) syz_open_procfs(0x0, &(0x7f0000000340)='schedstat\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f00000002c0)='./file0\x00'}, 0x10) setitimer(0x0, &(0x7f0000000500)={{0x77359400}, {0x77359400}}, &(0x7f0000000140)) recvmmsg(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000047c0)={0x77359400}) pipe(&(0x7f0000000180)) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 21:30:11 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240)={0x0, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:11 executing program 1: mlockall(0x0) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) lsetxattr$system_posix_acl(&(0x7f0000000480)='./file0\x00', &(0x7f00000009c0)="737973744fb01b40c828dc1226b337d4ee706f730700000063ffff61636365737300091bc1e89c476203285014056fad00000000000000000010000000000000002244fa25752208beb14ad0b0a2077963e32960a27a2a99fddf4d05fd174f9a40ac9f4d7e80325947832bd896ac727306cb58291a24e1c7a299f5129c96f7e03918e2b83b3371a7fe20e76a885a4be036ccbce2644819dc2bd529cb5ee15f20a26b", &(0x7f00000005c0)=ANY=[], 0x0, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:11 executing program 0: mlockall(0xfffffffffffffffc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:11 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)}, &(0x7f00000001c0)) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:11 executing program 5: mlockall(0x0) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:11 executing program 2: munlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) getsockname(0xffffffffffffffff, &(0x7f00000001c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000040)=0x80) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) add_key(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000300), &(0x7f00000003c0), 0x0, 0xfffffffffffffff9) keyctl$revoke(0x3, 0x0) syz_open_procfs(0x0, &(0x7f0000000340)='schedstat\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f00000002c0)='./file0\x00'}, 0x10) setitimer(0x0, &(0x7f0000000500)={{0x77359400}, {0x77359400}}, &(0x7f0000000140)) recvmmsg(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000047c0)={0x77359400}) pipe(&(0x7f0000000180)) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 21:30:12 executing program 2: munlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) getsockname(0xffffffffffffffff, &(0x7f00000001c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000040)=0x80) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) add_key(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000300), &(0x7f00000003c0), 0x0, 0xfffffffffffffff9) keyctl$revoke(0x3, 0x0) syz_open_procfs(0x0, &(0x7f0000000340)='schedstat\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f00000002c0)='./file0\x00'}, 0x10) setitimer(0x0, &(0x7f0000000500)={{0x77359400}, {0x77359400}}, &(0x7f0000000140)) recvmmsg(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000047c0)={0x77359400}) pipe(&(0x7f0000000180)) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 21:30:12 executing program 1: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) lsetxattr$system_posix_acl(&(0x7f0000000480)='./file0\x00', &(0x7f00000009c0)="737973744fb01b40c828dc1226b337d4ee706f730700000063ffff61636365737300091bc1e89c476203285014056fad00000000000000000010000000000000002244fa25752208beb14ad0b0a2077963e32960a27a2a99fddf4d05fd174f9a40ac9f4d7e80325947832bd896ac727306cb58291a24e1c7a299f5129c96f7e03918e2b83b3371a7fe20e76a885a4be036ccbce2644819dc2bd529cb5ee15f20a26b", &(0x7f00000005c0)=ANY=[], 0x0, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:12 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240)={0x0, 0x0, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:12 executing program 1: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) lsetxattr$system_posix_acl(&(0x7f0000000480)='./file0\x00', &(0x7f00000009c0)="737973744fb01b40c828dc1226b337d4ee706f730700000063ffff61636365737300091bc1e89c476203285014056fad00000000000000000010000000000000002244fa25752208beb14ad0b0a2077963e32960a27a2a99fddf4d05fd174f9a40ac9f4d7e80325947832bd896ac727306cb58291a24e1c7a299f5129c96f7e03918e2b83b3371a7fe20e76a885a4be036ccbce2644819dc2bd529cb5ee15f20a26b", &(0x7f00000005c0)=ANY=[], 0x0, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:12 executing program 2: munlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) getsockname(0xffffffffffffffff, &(0x7f00000001c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000040)=0x80) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) add_key(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000300), &(0x7f00000003c0), 0x0, 0xfffffffffffffff9) keyctl$revoke(0x3, 0x0) syz_open_procfs(0x0, &(0x7f0000000340)='schedstat\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f00000002c0)='./file0\x00'}, 0x10) setitimer(0x0, &(0x7f0000000500)={{0x77359400}, {0x77359400}}, &(0x7f0000000140)) recvmmsg(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000047c0)={0x77359400}) pipe(&(0x7f0000000180)) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 21:30:12 executing program 1: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) lsetxattr$system_posix_acl(&(0x7f0000000480)='./file0\x00', &(0x7f00000009c0)="737973744fb01b40c828dc1226b337d4ee706f730700000063ffff61636365737300091bc1e89c476203285014056fad00000000000000000010000000000000002244fa25752208beb14ad0b0a2077963e32960a27a2a99fddf4d05fd174f9a40ac9f4d7e80325947832bd896ac727306cb58291a24e1c7a299f5129c96f7e03918e2b83b3371a7fe20e76a885a4be036ccbce2644819dc2bd529cb5ee15f20a26b", &(0x7f00000005c0)=ANY=[], 0x0, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:12 executing program 1: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) lsetxattr$system_posix_acl(&(0x7f0000000480)='./file0\x00', &(0x7f00000009c0)="737973744fb01b40c828dc1226b337d4ee706f730700000063ffff61636365737300091bc1e89c476203285014056fad00000000000000000010000000000000002244fa25752208beb14ad0b0a2077963e32960a27a2a99fddf4d05fd174f9a40ac9f4d7e80325947832bd896ac727306cb58291a24e1c7a299f5129c96f7e03918e2b83b3371a7fe20e76a885a4be036ccbce2644819dc2bd529cb5ee15f20a26b", &(0x7f00000005c0)=ANY=[], 0x0, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:12 executing program 2: munlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) getsockname(0xffffffffffffffff, &(0x7f00000001c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000040)=0x80) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) add_key(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000300), &(0x7f00000003c0), 0x0, 0xfffffffffffffff9) keyctl$revoke(0x3, 0x0) syz_open_procfs(0x0, &(0x7f0000000340)='schedstat\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f00000002c0)='./file0\x00'}, 0x10) setitimer(0x0, &(0x7f0000000500)={{0x77359400}, {0x77359400}}, &(0x7f0000000140)) recvmmsg(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000047c0)={0x77359400}) pipe(&(0x7f0000000180)) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 21:30:12 executing program 0: mlockall(0xfffffffffffffffc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:12 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)}, &(0x7f00000001c0)) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:12 executing program 5: mlockall(0x0) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:12 executing program 1: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) lsetxattr$system_posix_acl(&(0x7f0000000480)='./file0\x00', &(0x7f00000009c0)="737973744fb01b40c828dc1226b337d4ee706f730700000063ffff61636365737300091bc1e89c476203285014056fad00000000000000000010000000000000002244fa25752208beb14ad0b0a2077963e32960a27a2a99fddf4d05fd174f9a40ac9f4d7e80325947832bd896ac727306cb58291a24e1c7a299f5129c96f7e03918e2b83b3371a7fe20e76a885a4be036ccbce2644819dc2bd529cb5ee15f20a26b", &(0x7f00000005c0)=ANY=[], 0x0, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:12 executing program 2: munlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) getsockname(0xffffffffffffffff, &(0x7f00000001c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000040)=0x80) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) add_key(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000300), &(0x7f00000003c0), 0x0, 0xfffffffffffffff9) keyctl$revoke(0x3, 0x0) syz_open_procfs(0x0, &(0x7f0000000340)='schedstat\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f00000002c0)='./file0\x00'}, 0x10) setitimer(0x0, &(0x7f0000000500)={{0x77359400}, {0x77359400}}, &(0x7f0000000140)) recvmmsg(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000047c0)={0x77359400}) pipe(&(0x7f0000000180)) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 21:30:12 executing program 2: munlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) getsockname(0xffffffffffffffff, &(0x7f00000001c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000040)=0x80) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) add_key(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000300), &(0x7f00000003c0), 0x0, 0xfffffffffffffff9) keyctl$revoke(0x3, 0x0) syz_open_procfs(0x0, &(0x7f0000000340)='schedstat\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f00000002c0)='./file0\x00'}, 0x10) setitimer(0x0, &(0x7f0000000500)={{0x77359400}, {0x77359400}}, &(0x7f0000000140)) recvmmsg(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000047c0)={0x77359400}) pipe(&(0x7f0000000180)) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 21:30:13 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240)={0x0, 0x0, 0x0, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:13 executing program 1: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) lsetxattr$system_posix_acl(&(0x7f0000000480)='./file0\x00', &(0x7f00000009c0)="737973744fb01b40c828dc1226b337d4ee706f730700000063ffff61636365737300091bc1e89c476203285014056fad00000000000000000010000000000000002244fa25752208beb14ad0b0a2077963e32960a27a2a99fddf4d05fd174f9a40ac9f4d7e80325947832bd896ac727306cb58291a24e1c7a299f5129c96f7e03918e2b83b3371a7fe20e76a885a4be036ccbce2644819dc2bd529cb5ee15f20a26b", &(0x7f00000005c0)=ANY=[], 0x0, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:13 executing program 2: munlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) getsockname(0xffffffffffffffff, &(0x7f00000001c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000040)=0x80) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) add_key(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000300), &(0x7f00000003c0), 0x0, 0xfffffffffffffff9) keyctl$revoke(0x3, 0x0) syz_open_procfs(0x0, &(0x7f0000000340)='schedstat\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f00000002c0)='./file0\x00'}, 0x10) setitimer(0x0, &(0x7f0000000500)={{0x77359400}, {0x77359400}}, &(0x7f0000000140)) recvmmsg(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000047c0)={0x77359400}) pipe(&(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 21:30:13 executing program 1: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) lsetxattr$system_posix_acl(&(0x7f0000000480)='./file0\x00', &(0x7f00000009c0)="737973744fb01b40c828dc1226b337d4ee706f730700000063ffff61636365737300091bc1e89c476203285014056fad00000000000000000010000000000000002244fa25752208beb14ad0b0a2077963e32960a27a2a99fddf4d05fd174f9a40ac9f4d7e80325947832bd896ac727306cb58291a24e1c7a299f5129c96f7e03918e2b83b3371a7fe20e76a885a4be036ccbce2644819dc2bd529cb5ee15f20a26b", &(0x7f00000005c0)=ANY=[], 0x0, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:13 executing program 1: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) lsetxattr$system_posix_acl(&(0x7f0000000480)='./file0\x00', &(0x7f00000009c0)="737973744fb01b40c828dc1226b337d4ee706f730700000063ffff61636365737300091bc1e89c476203285014056fad00000000000000000010000000000000002244fa25752208beb14ad0b0a2077963e32960a27a2a99fddf4d05fd174f9a40ac9f4d7e80325947832bd896ac727306cb58291a24e1c7a299f5129c96f7e03918e2b83b3371a7fe20e76a885a4be036ccbce2644819dc2bd529cb5ee15f20a26b", &(0x7f00000005c0)=ANY=[], 0x0, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:13 executing program 1: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) lsetxattr$system_posix_acl(&(0x7f0000000480)='./file0\x00', &(0x7f00000009c0)="737973744fb01b40c828dc1226b337d4ee706f730700000063ffff61636365737300091bc1e89c476203285014056fad00000000000000000010000000000000002244fa25752208beb14ad0b0a2077963e32960a27a2a99fddf4d05fd174f9a40ac9f4d7e80325947832bd896ac727306cb58291a24e1c7a299f5129c96f7e03918e2b83b3371a7fe20e76a885a4be036ccbce2644819dc2bd529cb5ee15f20a26b", &(0x7f00000005c0)=ANY=[], 0x0, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:13 executing program 0: mlockall(0x0) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:13 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)}, &(0x7f00000001c0)) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:13 executing program 5: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:13 executing program 1: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) lsetxattr$system_posix_acl(&(0x7f0000000480)='./file0\x00', &(0x7f00000009c0)="737973744fb01b40c828dc1226b337d4ee706f730700000063ffff61636365737300091bc1e89c476203285014056fad00000000000000000010000000000000002244fa25752208beb14ad0b0a2077963e32960a27a2a99fddf4d05fd174f9a40ac9f4d7e80325947832bd896ac727306cb58291a24e1c7a299f5129c96f7e03918e2b83b3371a7fe20e76a885a4be036ccbce2644819dc2bd529cb5ee15f20a26b", &(0x7f00000005c0)=ANY=[], 0x0, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") [ 547.319736] audit: type=1326 audit(1536960613.715:107): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=13636 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 21:30:13 executing program 5: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:13 executing program 5: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:13 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:13 executing program 1: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) lsetxattr$system_posix_acl(&(0x7f0000000480)='./file0\x00', &(0x7f00000009c0)="737973744fb01b40c828dc1226b337d4ee706f730700000063ffff61636365737300091bc1e89c476203285014056fad00000000000000000010000000000000002244fa25752208beb14ad0b0a2077963e32960a27a2a99fddf4d05fd174f9a40ac9f4d7e80325947832bd896ac727306cb58291a24e1c7a299f5129c96f7e03918e2b83b3371a7fe20e76a885a4be036ccbce2644819dc2bd529cb5ee15f20a26b", &(0x7f00000005c0)=ANY=[], 0x0, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:13 executing program 2: munlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) getsockname(0xffffffffffffffff, &(0x7f00000001c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000040)=0x80) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) add_key(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000300), &(0x7f00000003c0), 0x0, 0xfffffffffffffff9) keyctl$revoke(0x3, 0x0) syz_open_procfs(0x0, &(0x7f0000000340)='schedstat\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f00000002c0)='./file0\x00'}, 0x10) setitimer(0x0, &(0x7f0000000500)={{0x77359400}, {0x77359400}}, &(0x7f0000000140)) recvmmsg(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000047c0)={0x77359400}) pipe(&(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 21:30:13 executing program 5: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:14 executing program 5: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") [ 547.585925] audit: type=1326 audit(1536960613.985:108): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=13650 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 21:30:14 executing program 5: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:14 executing program 0: mlockall(0x0) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:14 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)}, &(0x7f00000001c0)) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:14 executing program 1: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) lsetxattr$system_posix_acl(&(0x7f0000000480)='./file0\x00', &(0x7f00000009c0)="737973744fb01b40c828dc1226b337d4ee706f730700000063ffff61636365737300091bc1e89c476203285014056fad00000000000000000010000000000000002244fa25752208beb14ad0b0a2077963e32960a27a2a99fddf4d05fd174f9a40ac9f4d7e80325947832bd896ac727306cb58291a24e1c7a299f5129c96f7e03918e2b83b3371a7fe20e76a885a4be036ccbce2644819dc2bd529cb5ee15f20a26b", &(0x7f00000005c0)=ANY=[], 0x0, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:14 executing program 5: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") [ 547.998746] audit: type=1326 audit(1536960614.395:109): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=13674 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 21:30:14 executing program 5: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:14 executing program 5: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:14 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:14 executing program 1: socketpair$inet(0x2, 0xe, 0x0, &(0x7f0000000080)) socket$netlink(0x10, 0x3, 0x0) syz_emit_ethernet(0xe, &(0x7f0000000140)={@link_local, @remote}, &(0x7f0000000040)) open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002a80), 0x3a4, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000180), 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in6, @in=@dev}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000200)=0xe8) pipe2(&(0x7f00000000c0), 0x0) 21:30:14 executing program 5: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:14 executing program 2: munlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) getsockname(0xffffffffffffffff, &(0x7f00000001c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000040)=0x80) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) add_key(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000300), &(0x7f00000003c0), 0x0, 0xfffffffffffffff9) keyctl$revoke(0x3, 0x0) syz_open_procfs(0x0, &(0x7f0000000340)='schedstat\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f00000002c0)='./file0\x00'}, 0x10) setitimer(0x0, &(0x7f0000000500)={{0x77359400}, {0x77359400}}, &(0x7f0000000140)) recvmmsg(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000047c0)={0x77359400}) pipe(&(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") [ 548.486792] audit: type=1326 audit(1536960614.885:110): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=13693 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 21:30:15 executing program 5: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") [ 548.640983] audit: type=1326 audit(1536960615.035:111): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=13704 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 21:30:15 executing program 0: mlockall(0x0) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:15 executing program 5: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") [ 548.791258] audit: type=1326 audit(1536960615.185:112): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=13708 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 21:30:15 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)}, &(0x7f00000001c0)) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:15 executing program 5: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") [ 548.984781] audit: type=1326 audit(1536960615.385:113): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=13720 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 21:30:15 executing program 5: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) lsetxattr$system_posix_acl(&(0x7f0000000480)='./file0\x00', &(0x7f00000009c0)="737973744fb01b40c828dc1226b337d4ee706f730700000063ffff61636365737300091bc1e89c476203285014056fad00000000000000000010000000000000002244fa25752208beb14ad0b0a2077963e32960a27a2a99fddf4d05fd174f9a40ac9f4d7e80325947832bd896ac727306cb58291a24e1c7a299f5129c96f7e03918e2b83b3371a7fe20e76a885a4be036ccbce2644819dc2bd529cb5ee15f20a26b", &(0x7f00000005c0)=ANY=[], 0x0, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:15 executing program 5: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240)={0x0, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:15 executing program 2: munlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) getsockname(0xffffffffffffffff, &(0x7f00000001c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000040)=0x80) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) add_key(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000300), &(0x7f00000003c0), 0x0, 0xfffffffffffffff9) keyctl$revoke(0x3, 0x0) syz_open_procfs(0x0, &(0x7f0000000340)='schedstat\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f00000002c0)='./file0\x00'}, 0x10) setitimer(0x0, &(0x7f0000000500)={{0x77359400}, {0x77359400}}, &(0x7f0000000140)) recvmmsg(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000047c0)={0x77359400}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 21:30:15 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:15 executing program 1: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:15 executing program 1: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)}, &(0x7f00000001c0)) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:16 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:16 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:16 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)}, &(0x7f00000001c0)) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:16 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:16 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:16 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:16 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:16 executing program 5: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)}, &(0x7f00000001c0)) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:16 executing program 2: munlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) getsockname(0xffffffffffffffff, &(0x7f00000001c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000040)=0x80) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) add_key(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000300), &(0x7f00000003c0), 0x0, 0xfffffffffffffff9) keyctl$revoke(0x3, 0x0) syz_open_procfs(0x0, &(0x7f0000000340)='schedstat\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f00000002c0)='./file0\x00'}, 0x10) setitimer(0x0, &(0x7f0000000500)={{0x77359400}, {0x77359400}}, &(0x7f0000000140)) recvmmsg(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000047c0)={0x77359400}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 21:30:16 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:16 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:16 executing program 1: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:16 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:16 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:17 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)}, &(0x7f00000001c0)) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) r0 = eventfd2(0x0, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:17 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") [ 550.778720] audit: type=1326 audit(1536960617.175:114): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=13792 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 21:30:17 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") [ 550.928104] audit: type=1326 audit(1536960617.325:115): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=13799 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 21:30:17 executing program 5: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:17 executing program 2: munlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) getsockname(0xffffffffffffffff, &(0x7f00000001c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000040)=0x80) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) add_key(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000300), &(0x7f00000003c0), 0x0, 0xfffffffffffffff9) keyctl$revoke(0x3, 0x0) syz_open_procfs(0x0, &(0x7f0000000340)='schedstat\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f00000002c0)='./file0\x00'}, 0x10) setitimer(0x0, &(0x7f0000000500)={{0x77359400}, {0x77359400}}, &(0x7f0000000140)) recvmmsg(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000047c0)={0x77359400}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 21:30:17 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:17 executing program 5: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)}, &(0x7f00000001c0)) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0x0, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") [ 551.100852] audit: type=1326 audit(1536960617.495:116): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=13807 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 21:30:17 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:17 executing program 0: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:17 executing program 1: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:17 executing program 0: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:18 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)}, &(0x7f00000001c0)) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) r0 = eventfd2(0x0, 0x0) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:18 executing program 2: munlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) getsockname(0xffffffffffffffff, &(0x7f00000001c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000040)=0x80) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) add_key(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000300), &(0x7f00000003c0), 0x0, 0xfffffffffffffff9) keyctl$revoke(0x3, 0x0) syz_open_procfs(0x0, &(0x7f0000000340)='schedstat\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f00000002c0)='./file0\x00'}, 0x10) setitimer(0x0, &(0x7f0000000500)={{0x77359400}, {0x77359400}}, &(0x7f0000000140)) pipe(&(0x7f0000000180)) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 21:30:18 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)={0x0, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:18 executing program 1: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:18 executing program 5: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x1, r0}, &(0x7f00000001c0)) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r1 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r1, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:18 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)}, &(0x7f00000001c0)) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) eventfd2(0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:19 executing program 2: munlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) getsockname(0xffffffffffffffff, &(0x7f00000001c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000040)=0x80) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) add_key(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000300), &(0x7f00000003c0), 0x0, 0xfffffffffffffff9) keyctl$revoke(0x3, 0x0) syz_open_procfs(0x0, &(0x7f0000000340)='schedstat\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f00000002c0)='./file0\x00'}, 0x10) setitimer(0x0, &(0x7f0000000500)={{0x77359400}, {0x77359400}}, &(0x7f0000000140)) pipe(&(0x7f0000000180)) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 21:30:19 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)={0x0, 0x0, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:19 executing program 1: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) 21:30:19 executing program 5: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:19 executing program 1: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) 21:30:20 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:20 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)}, &(0x7f00000001c0)) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) eventfd2(0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:20 executing program 2: munlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) getsockname(0xffffffffffffffff, &(0x7f00000001c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000040)=0x80) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) add_key(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000300), &(0x7f00000003c0), 0x0, 0xfffffffffffffff9) keyctl$revoke(0x3, 0x0) syz_open_procfs(0x0, &(0x7f0000000340)='schedstat\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f00000002c0)='./file0\x00'}, 0x10) setitimer(0x0, &(0x7f0000000500)={{0x77359400}, {0x77359400}}, &(0x7f0000000140)) pipe(&(0x7f0000000180)) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 21:30:20 executing program 1: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) 21:30:20 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)={0x0, 0x0, 0x0, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:20 executing program 5: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:21 executing program 1: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:21 executing program 2: munlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) getsockname(0xffffffffffffffff, &(0x7f00000001c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000040)=0x80) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) add_key(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000300), &(0x7f00000003c0), 0x0, 0xfffffffffffffff9) keyctl$revoke(0x3, 0x0) syz_open_procfs(0x0, &(0x7f0000000340)='schedstat\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f00000002c0)='./file0\x00'}, 0x10) recvmmsg(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000047c0)={0x77359400}) pipe(&(0x7f0000000180)) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 21:30:21 executing program 0: io_setup(0x0, &(0x7f0000000040)=0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) io_cancel(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0xf, 0xff, r1, &(0x7f00000000c0)="14c6a90cc74d5c6ae015378b710794bc09a4b96cd62affbe0a6dd277843312849c843b6954ecfa9325", 0x29, 0x2, 0x0, 0x1, r2}, &(0x7f00000001c0)) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r3 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r3, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:21 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) 21:30:21 executing program 5: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:21 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:22 executing program 1: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:22 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) 21:30:22 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:22 executing program 2: munlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) getsockname(0xffffffffffffffff, &(0x7f00000001c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000040)=0x80) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) add_key(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000300), &(0x7f00000003c0), 0x0, 0xfffffffffffffff9) keyctl$revoke(0x3, 0x0) syz_open_procfs(0x0, &(0x7f0000000340)='schedstat\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f00000002c0)='./file0\x00'}, 0x10) recvmmsg(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000047c0)={0x77359400}) pipe(&(0x7f0000000180)) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 21:30:22 executing program 0: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) 21:30:22 executing program 5: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:22 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:23 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) lsetxattr$system_posix_acl(&(0x7f0000000480)='./file0\x00', &(0x7f00000009c0)="737973744fb01b40c828dc1226b337d4ee706f730700000063ffff61636365737300091bc1e89c476203285014056fad00000000000000000010000000000000002244fa25752208beb14ad0b0a2077963e32960a27a2a99fddf4d05fd174f9a40ac9f4d7e80325947832bd896ac727306cb58291a24e1c7a299f5129c96f7e03918e2b83b3371a7fe20e76a885a4be036ccbce2644819dc2bd529cb5ee15f20a26b", &(0x7f00000005c0)=ANY=[], 0x0, 0x0) clock_settime(0x0, &(0x7f00000001c0)={0x0, 0x989680}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:23 executing program 1: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:23 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:23 executing program 2: munlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) getsockname(0xffffffffffffffff, &(0x7f00000001c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000040)=0x80) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) add_key(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000300), &(0x7f00000003c0), 0x0, 0xfffffffffffffff9) keyctl$revoke(0x3, 0x0) syz_open_procfs(0x0, &(0x7f0000000340)='schedstat\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f00000002c0)='./file0\x00'}, 0x10) recvmmsg(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000047c0)={0x77359400}) pipe(&(0x7f0000000180)) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 21:30:23 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:23 executing program 5: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) 21:30:23 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:24 executing program 5: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) 21:30:24 executing program 1: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:24 executing program 0: io_setup(0x7, &(0x7f0000000040)=0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) io_cancel(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0xf, 0xff, r1, &(0x7f00000000c0)="14c6a90cc74d5c6ae015378b710794bc09a4b96cd62affbe0a6dd277843312849c843b6954ecfa9325", 0x29, 0x2, 0x0, 0x1, r2}, &(0x7f00000001c0)) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:24 executing program 5: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) 21:30:24 executing program 2: munlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) getsockname(0xffffffffffffffff, &(0x7f00000001c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000040)=0x80) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) add_key(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000300), &(0x7f00000003c0), 0x0, 0xfffffffffffffff9) keyctl$revoke(0x3, 0x0) syz_open_procfs(0x0, &(0x7f0000000340)='schedstat\x00') setitimer(0x0, &(0x7f0000000500)={{0x77359400}, {0x77359400}}, &(0x7f0000000140)) recvmmsg(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000047c0)={0x77359400}) pipe(&(0x7f0000000180)) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 21:30:24 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:24 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:24 executing program 5: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:24 executing program 1: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:25 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:25 executing program 2: munlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) getsockname(0xffffffffffffffff, &(0x7f00000001c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000040)=0x80) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) add_key(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000300), &(0x7f00000003c0), 0x0, 0xfffffffffffffff9) keyctl$revoke(0x3, 0x0) syz_open_procfs(0x0, &(0x7f0000000340)='schedstat\x00') setitimer(0x0, &(0x7f0000000500)={{0x77359400}, {0x77359400}}, &(0x7f0000000140)) recvmmsg(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000047c0)={0x77359400}) pipe(&(0x7f0000000180)) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 21:30:25 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) 21:30:25 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:25 executing program 5: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:25 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) 21:30:25 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) 21:30:25 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:25 executing program 1: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:25 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:26 executing program 2: munlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) getsockname(0xffffffffffffffff, &(0x7f00000001c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000040)=0x80) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) add_key(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000300), &(0x7f00000003c0), 0x0, 0xfffffffffffffff9) keyctl$revoke(0x3, 0x0) syz_open_procfs(0x0, &(0x7f0000000340)='schedstat\x00') setitimer(0x0, &(0x7f0000000500)={{0x77359400}, {0x77359400}}, &(0x7f0000000140)) recvmmsg(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000047c0)={0x77359400}) pipe(&(0x7f0000000180)) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 21:30:26 executing program 5: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:26 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:26 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:26 executing program 1: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:26 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:27 executing program 2: munlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) getsockname(0xffffffffffffffff, &(0x7f00000001c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000040)=0x80) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) add_key(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000300), &(0x7f00000003c0), 0x0, 0xfffffffffffffff9) keyctl$revoke(0x3, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f00000002c0)='./file0\x00'}, 0x10) setitimer(0x0, &(0x7f0000000500)={{0x77359400}, {0x77359400}}, &(0x7f0000000140)) recvmmsg(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000047c0)={0x77359400}) pipe(&(0x7f0000000180)) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 21:30:27 executing program 5: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:27 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) r0 = eventfd2(0x0, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:27 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) 21:30:27 executing program 1: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:27 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:27 executing program 2: munlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) getsockname(0xffffffffffffffff, &(0x7f00000001c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000040)=0x80) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) add_key(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000300), &(0x7f00000003c0), 0x0, 0xfffffffffffffff9) keyctl$revoke(0x3, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f00000002c0)='./file0\x00'}, 0x10) setitimer(0x0, &(0x7f0000000500)={{0x77359400}, {0x77359400}}, &(0x7f0000000140)) recvmmsg(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000047c0)={0x77359400}) pipe(&(0x7f0000000180)) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 21:30:28 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) 21:30:28 executing program 5: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:28 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) r0 = eventfd2(0x0, 0x0) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:28 executing program 1: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:28 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:28 executing program 2: munlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) getsockname(0xffffffffffffffff, &(0x7f00000001c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000040)=0x80) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) add_key(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000300), &(0x7f00000003c0), 0x0, 0xfffffffffffffff9) keyctl$revoke(0x3, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f00000002c0)='./file0\x00'}, 0x10) setitimer(0x0, &(0x7f0000000500)={{0x77359400}, {0x77359400}}, &(0x7f0000000140)) recvmmsg(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000047c0)={0x77359400}) pipe(&(0x7f0000000180)) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 21:30:28 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) 21:30:29 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) eventfd2(0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:29 executing program 5: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:29 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:29 executing program 1: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:29 executing program 2: munlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) getsockname(0xffffffffffffffff, &(0x7f00000001c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000040)=0x80) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) add_key(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000300), &(0x7f00000003c0), 0x0, 0xfffffffffffffff9) syz_open_procfs(0x0, &(0x7f0000000340)='schedstat\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f00000002c0)='./file0\x00'}, 0x10) setitimer(0x0, &(0x7f0000000500)={{0x77359400}, {0x77359400}}, &(0x7f0000000140)) recvmmsg(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000047c0)={0x77359400}) pipe(&(0x7f0000000180)) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 21:30:29 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:29 executing program 1: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:30 executing program 1: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:30 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) eventfd2(0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:30 executing program 5: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:30 executing program 1: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:30 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:30 executing program 1: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:30 executing program 1: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:30 executing program 1: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:30 executing program 5: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:30 executing program 2: munlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) getsockname(0xffffffffffffffff, &(0x7f00000001c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000040)=0x80) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) add_key(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000300), &(0x7f00000003c0), 0x0, 0xfffffffffffffff9) syz_open_procfs(0x0, &(0x7f0000000340)='schedstat\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f00000002c0)='./file0\x00'}, 0x10) setitimer(0x0, &(0x7f0000000500)={{0x77359400}, {0x77359400}}, &(0x7f0000000140)) recvmmsg(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000047c0)={0x77359400}) pipe(&(0x7f0000000180)) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 21:30:30 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:30 executing program 1: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:30 executing program 5: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:31 executing program 5: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:31 executing program 1: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:31 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) eventfd2(0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:31 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:31 executing program 5: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:31 executing program 5: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:31 executing program 5: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:31 executing program 1: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:31 executing program 2: munlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) getsockname(0xffffffffffffffff, &(0x7f00000001c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000040)=0x80) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) add_key(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000300), &(0x7f00000003c0), 0x0, 0xfffffffffffffff9) syz_open_procfs(0x0, &(0x7f0000000340)='schedstat\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f00000002c0)='./file0\x00'}, 0x10) setitimer(0x0, &(0x7f0000000500)={{0x77359400}, {0x77359400}}, &(0x7f0000000140)) recvmmsg(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000047c0)={0x77359400}) pipe(&(0x7f0000000180)) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 21:30:31 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:31 executing program 5: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:31 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:31 executing program 5: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:31 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:31 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) eventfd2(0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:32 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:32 executing program 5: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:32 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:32 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:32 executing program 1: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:32 executing program 2: munlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) getsockname(0xffffffffffffffff, &(0x7f00000001c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000040)=0x80) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) keyctl$revoke(0x3, 0x0) syz_open_procfs(0x0, &(0x7f0000000340)='schedstat\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f00000002c0)='./file0\x00'}, 0x10) setitimer(0x0, &(0x7f0000000500)={{0x77359400}, {0x77359400}}, &(0x7f0000000140)) recvmmsg(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000047c0)={0x77359400}) pipe(&(0x7f0000000180)) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 21:30:32 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:32 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:32 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:32 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:32 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:32 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) r0 = eventfd2(0x0, 0x0) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:32 executing program 5: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:32 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:33 executing program 2: munlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) getsockname(0xffffffffffffffff, &(0x7f00000001c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000040)=0x80) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) keyctl$revoke(0x3, 0x0) syz_open_procfs(0x0, &(0x7f0000000340)='schedstat\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f00000002c0)='./file0\x00'}, 0x10) setitimer(0x0, &(0x7f0000000500)={{0x77359400}, {0x77359400}}, &(0x7f0000000140)) recvmmsg(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000047c0)={0x77359400}) pipe(&(0x7f0000000180)) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 21:30:33 executing program 1: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:33 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:33 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:33 executing program 5: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:33 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:33 executing program 2: munlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) getsockname(0xffffffffffffffff, &(0x7f00000001c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000040)=0x80) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) keyctl$revoke(0x3, 0x0) syz_open_procfs(0x0, &(0x7f0000000340)='schedstat\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f00000002c0)='./file0\x00'}, 0x10) setitimer(0x0, &(0x7f0000000500)={{0x77359400}, {0x77359400}}, &(0x7f0000000140)) recvmmsg(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000047c0)={0x77359400}) pipe(&(0x7f0000000180)) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 21:30:34 executing program 1: io_setup(0x7, &(0x7f0000000040)) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:34 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:34 executing program 5: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:34 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:34 executing program 2: munlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) getsockname(0xffffffffffffffff, &(0x7f00000001c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000040)=0x80) add_key(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000300), &(0x7f00000003c0), 0x0, 0xfffffffffffffff9) keyctl$revoke(0x3, 0x0) syz_open_procfs(0x0, &(0x7f0000000340)='schedstat\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f00000002c0)='./file0\x00'}, 0x10) setitimer(0x0, &(0x7f0000000500)={{0x77359400}, {0x77359400}}, &(0x7f0000000140)) recvmmsg(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000047c0)={0x77359400}) pipe(&(0x7f0000000180)) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 21:30:34 executing program 1: io_setup(0x7, &(0x7f0000000040)) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:35 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:35 executing program 5: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:36 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:36 executing program 3: io_setup(0x7, &(0x7f0000000040)) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:36 executing program 2: munlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) getsockname(0xffffffffffffffff, &(0x7f00000001c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000040)=0x80) add_key(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000300), &(0x7f00000003c0), 0x0, 0xfffffffffffffff9) keyctl$revoke(0x3, 0x0) syz_open_procfs(0x0, &(0x7f0000000340)='schedstat\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f00000002c0)='./file0\x00'}, 0x10) setitimer(0x0, &(0x7f0000000500)={{0x77359400}, {0x77359400}}, &(0x7f0000000140)) recvmmsg(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000047c0)={0x77359400}) pipe(&(0x7f0000000180)) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 21:30:36 executing program 1: io_setup(0x7, &(0x7f0000000040)) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:36 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:36 executing program 5: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:37 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:37 executing program 2: munlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) getsockname(0xffffffffffffffff, &(0x7f00000001c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000040)=0x80) add_key(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000300), &(0x7f00000003c0), 0x0, 0xfffffffffffffff9) keyctl$revoke(0x3, 0x0) syz_open_procfs(0x0, &(0x7f0000000340)='schedstat\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f00000002c0)='./file0\x00'}, 0x10) setitimer(0x0, &(0x7f0000000500)={{0x77359400}, {0x77359400}}, &(0x7f0000000140)) recvmmsg(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000047c0)={0x77359400}) pipe(&(0x7f0000000180)) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 21:30:37 executing program 1: io_setup(0x0, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:37 executing program 3: io_setup(0x7, &(0x7f0000000040)) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:37 executing program 5: io_setup(0x7, &(0x7f0000000040)) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:38 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:39 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:39 executing program 2: munlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) add_key(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000300), &(0x7f00000003c0), 0x0, 0xfffffffffffffff9) keyctl$revoke(0x3, 0x0) syz_open_procfs(0x0, &(0x7f0000000340)='schedstat\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f00000002c0)='./file0\x00'}, 0x10) setitimer(0x0, &(0x7f0000000500)={{0x77359400}, {0x77359400}}, &(0x7f0000000140)) recvmmsg(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000047c0)={0x77359400}) pipe(&(0x7f0000000180)) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 21:30:39 executing program 1: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:39 executing program 5: io_setup(0x7, &(0x7f0000000040)) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:39 executing program 3: io_setup(0x7, &(0x7f0000000040)) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:39 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:40 executing program 1: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:40 executing program 1: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:40 executing program 1: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:40 executing program 1: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:40 executing program 1: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:40 executing program 2: munlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) add_key(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000300), &(0x7f00000003c0), 0x0, 0xfffffffffffffff9) keyctl$revoke(0x3, 0x0) syz_open_procfs(0x0, &(0x7f0000000340)='schedstat\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f00000002c0)='./file0\x00'}, 0x10) setitimer(0x0, &(0x7f0000000500)={{0x77359400}, {0x77359400}}, &(0x7f0000000140)) recvmmsg(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000047c0)={0x77359400}) pipe(&(0x7f0000000180)) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 21:30:40 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:40 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:40 executing program 1: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:40 executing program 3: io_setup(0x0, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:40 executing program 5: io_setup(0x7, &(0x7f0000000040)) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:40 executing program 1: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:40 executing program 1: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:40 executing program 1: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:40 executing program 1: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:41 executing program 1: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:41 executing program 1: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") [ 574.716243] audit: type=1326 audit(1536960641.111:117): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=14480 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 21:30:41 executing program 2: munlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) add_key(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000300), &(0x7f00000003c0), 0x0, 0xfffffffffffffff9) keyctl$revoke(0x3, 0x0) syz_open_procfs(0x0, &(0x7f0000000340)='schedstat\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f00000002c0)='./file0\x00'}, 0x10) setitimer(0x0, &(0x7f0000000500)={{0x77359400}, {0x77359400}}, &(0x7f0000000140)) recvmmsg(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000047c0)={0x77359400}) pipe(&(0x7f0000000180)) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 21:30:41 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) 21:30:41 executing program 1: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:41 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:41 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:41 executing program 5: io_setup(0x0, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") [ 575.331320] audit: type=1326 audit(1536960641.731:118): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=14493 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 21:30:41 executing program 1: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:42 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") [ 575.571415] audit: type=1326 audit(1536960641.971:119): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=14510 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 21:30:42 executing program 1: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0x0, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:42 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:42 executing program 2: munlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) getsockname(0xffffffffffffffff, &(0x7f00000001c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000040)=0x80) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) add_key(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000300), &(0x7f00000003c0), 0x0, 0xfffffffffffffff9) keyctl$revoke(0x3, 0x0) syz_open_procfs(0x0, &(0x7f0000000340)='schedstat\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f00000002c0)='./file0\x00'}, 0x10) setitimer(0x0, &(0x7f0000000500)={{0x77359400}, {0x77359400}}, &(0x7f0000000140)) recvmmsg(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000047c0)={0x77359400}) pipe(&(0x7f0000000180)) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 21:30:42 executing program 2: munlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) getsockname(0xffffffffffffffff, &(0x7f00000001c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000040)=0x80) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) add_key(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000300), &(0x7f00000003c0), 0x0, 0xfffffffffffffff9) keyctl$revoke(0x3, 0x0) syz_open_procfs(0x0, &(0x7f0000000340)='schedstat\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f00000002c0)='./file0\x00'}, 0x10) setitimer(0x0, &(0x7f0000000500)={{0x77359400}, {0x77359400}}, &(0x7f0000000140)) recvmmsg(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000047c0)={0x77359400}) pipe(&(0x7f0000000180)) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 21:30:42 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:42 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) 21:30:42 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:42 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:42 executing program 2: munlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) getsockname(0xffffffffffffffff, &(0x7f00000001c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000040)=0x80) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) add_key(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000300), &(0x7f00000003c0), 0x0, 0xfffffffffffffff9) keyctl$revoke(0x3, 0x0) syz_open_procfs(0x0, &(0x7f0000000340)='schedstat\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f00000002c0)='./file0\x00'}, 0x10) setitimer(0x0, &(0x7f0000000500)={{0x77359400}, {0x77359400}}, &(0x7f0000000140)) recvmmsg(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000047c0)={0x77359400}) pipe(&(0x7f0000000180)) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 21:30:42 executing program 5: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:42 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:42 executing program 2: munlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) getsockname(0xffffffffffffffff, &(0x7f00000001c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000040)=0x80) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) add_key(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000300), &(0x7f00000003c0), 0x0, 0xfffffffffffffff9) keyctl$revoke(0x3, 0x0) syz_open_procfs(0x0, &(0x7f0000000340)='schedstat\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f00000002c0)='./file0\x00'}, 0x10) setitimer(0x0, &(0x7f0000000500)={{0x77359400}, {0x77359400}}, &(0x7f0000000140)) recvmmsg(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000047c0)={0x77359400}) pipe(&(0x7f0000000180)) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 21:30:43 executing program 1: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0x0, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:43 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:43 executing program 2: munlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) getsockname(0xffffffffffffffff, &(0x7f00000001c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000040)=0x80) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) add_key(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000300), &(0x7f00000003c0), 0x0, 0xfffffffffffffff9) keyctl$revoke(0x3, 0x0) syz_open_procfs(0x0, &(0x7f0000000340)='schedstat\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f00000002c0)='./file0\x00'}, 0x10) setitimer(0x0, &(0x7f0000000500)={{0x77359400}, {0x77359400}}, &(0x7f0000000140)) recvmmsg(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000047c0)={0x77359400}) pipe(&(0x7f0000000180)) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 21:30:43 executing program 5: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:43 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) 21:30:43 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:43 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:43 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:43 executing program 2: munlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) getsockname(0xffffffffffffffff, &(0x7f00000001c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000040)=0x80) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) add_key(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000300), &(0x7f00000003c0), 0x0, 0xfffffffffffffff9) keyctl$revoke(0x3, 0x0) syz_open_procfs(0x0, &(0x7f0000000340)='schedstat\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f00000002c0)='./file0\x00'}, 0x10) setitimer(0x0, &(0x7f0000000500)={{0x77359400}, {0x77359400}}, &(0x7f0000000140)) recvmmsg(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000047c0)={0x77359400}) pipe(&(0x7f0000000180)) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 21:30:43 executing program 5: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:43 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:43 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:44 executing program 1: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:44 executing program 2: munlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) getsockname(0xffffffffffffffff, &(0x7f00000001c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000040)=0x80) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) add_key(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000300), &(0x7f00000003c0), 0x0, 0xfffffffffffffff9) keyctl$revoke(0x3, 0x0) syz_open_procfs(0x0, &(0x7f0000000340)='schedstat\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f00000002c0)='./file0\x00'}, 0x10) setitimer(0x0, &(0x7f0000000500)={{0x77359400}, {0x77359400}}, &(0x7f0000000140)) recvmmsg(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000047c0)={0x77359400}) pipe(&(0x7f0000000180)) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 21:30:44 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:44 executing program 5: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:44 executing program 5: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:44 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:44 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:44 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:44 executing program 2: munlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) getsockname(0xffffffffffffffff, &(0x7f00000001c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000040)=0x80) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) add_key(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000300), &(0x7f00000003c0), 0x0, 0xfffffffffffffff9) keyctl$revoke(0x3, 0x0) syz_open_procfs(0x0, &(0x7f0000000340)='schedstat\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f00000002c0)='./file0\x00'}, 0x10) setitimer(0x0, &(0x7f0000000500)={{0x77359400}, {0x77359400}}, &(0x7f0000000140)) recvmmsg(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000047c0)={0x77359400}) pipe(&(0x7f0000000180)) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 21:30:44 executing program 5: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:44 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:44 executing program 5: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") [ 577.958027] audit: type=1326 audit(1536960644.351:120): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=14632 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 21:30:44 executing program 1: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:44 executing program 5: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:44 executing program 2: munlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) getsockname(0xffffffffffffffff, &(0x7f00000001c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000040)=0x80) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) add_key(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000300), &(0x7f00000003c0), 0x0, 0xfffffffffffffff9) keyctl$revoke(0x3, 0x0) syz_open_procfs(0x0, &(0x7f0000000340)='schedstat\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f00000002c0)='./file0\x00'}, 0x10) setitimer(0x0, &(0x7f0000000500)={{0x77359400}, {0x77359400}}, &(0x7f0000000140)) recvmmsg(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000047c0)={0x77359400}) pipe(&(0x7f0000000180)) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 21:30:44 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:44 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:45 executing program 5: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") [ 578.575808] audit: type=1326 audit(1536960644.971:121): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=14658 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 21:30:45 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:45 executing program 5: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:45 executing program 2: munlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) getsockname(0xffffffffffffffff, &(0x7f00000001c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000040)=0x80) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) add_key(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000300), &(0x7f00000003c0), 0x0, 0xfffffffffffffff9) keyctl$revoke(0x3, 0x0) syz_open_procfs(0x0, &(0x7f0000000340)='schedstat\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f00000002c0)='./file0\x00'}, 0x10) setitimer(0x0, &(0x7f0000000500)={{0x77359400}, {0x77359400}}, &(0x7f0000000140)) recvmmsg(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000047c0)={0x77359400}) pipe(&(0x7f0000000180)) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 21:30:45 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:45 executing program 5: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") [ 578.818459] audit: type=1326 audit(1536960645.211:122): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=14681 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 21:30:45 executing program 5: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") [ 578.954700] audit: type=1326 audit(1536960645.251:123): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=14680 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 21:30:45 executing program 1: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:45 executing program 5: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:45 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0x0, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:45 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") [ 579.483468] audit: type=1326 audit(1536960645.881:124): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=14700 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 21:30:46 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:46 executing program 2: munlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) getsockname(0xffffffffffffffff, &(0x7f00000001c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000040)=0x80) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) add_key(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000300), &(0x7f00000003c0), 0x0, 0xfffffffffffffff9) keyctl$revoke(0x3, 0x0) syz_open_procfs(0x0, &(0x7f0000000340)='schedstat\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f00000002c0)='./file0\x00'}, 0x10) setitimer(0x0, &(0x7f0000000500)={{0x77359400}, {0x77359400}}, &(0x7f0000000140)) recvmmsg(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000047c0)={0x77359400}) pipe(&(0x7f0000000180)) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 21:30:46 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:46 executing program 5: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") [ 579.679490] audit: type=1326 audit(1536960646.071:125): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=14717 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 21:30:46 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") [ 579.860308] audit: type=1326 audit(1536960646.141:126): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=14723 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 21:30:46 executing program 5: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:46 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") [ 580.032282] audit: type=1326 audit(1536960646.401:127): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=14734 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 21:30:46 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:46 executing program 1: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240)={0x0, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:46 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:46 executing program 5: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0x0, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:46 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0x0, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:46 executing program 2: munlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) getsockname(0xffffffffffffffff, &(0x7f00000001c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000040)=0x80) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) add_key(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000300), &(0x7f00000003c0), 0x0, 0xfffffffffffffff9) keyctl$revoke(0x3, 0x0) syz_open_procfs(0x0, &(0x7f0000000340)='schedstat\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f00000002c0)='./file0\x00'}, 0x10) setitimer(0x0, &(0x7f0000000500)={{0x77359400}, {0x77359400}}, &(0x7f0000000140)) recvmmsg(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000047c0)={0x77359400}) pipe(&(0x7f0000000180)) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 21:30:46 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") [ 580.508934] audit: type=1326 audit(1536960646.901:128): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=14756 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 21:30:46 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:47 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:47 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:47 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:47 executing program 2: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:47 executing program 1: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240)={0x0, 0x0, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:47 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:47 executing program 5: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0x0, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:47 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:47 executing program 2: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:48 executing program 2: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:48 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:48 executing program 1: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240)={0x0, 0x0, 0x0, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:48 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:48 executing program 5: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:48 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:48 executing program 2: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:49 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:49 executing program 1: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:49 executing program 5: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:49 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:49 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:49 executing program 2: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:50 executing program 4: io_setup(0x7, &(0x7f0000000040)) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:50 executing program 5: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:50 executing program 1: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:50 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240)={0x0, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:50 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:50 executing program 2: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:50 executing program 2: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:51 executing program 2: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:51 executing program 2: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:51 executing program 4: io_setup(0x7, &(0x7f0000000040)) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:51 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:51 executing program 5: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240)={0x0, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:51 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240)={0x0, 0x0, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:51 executing program 1: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:51 executing program 2: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:51 executing program 2: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:51 executing program 2: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:51 executing program 2: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:51 executing program 2: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:51 executing program 2: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:52 executing program 4: io_setup(0x7, &(0x7f0000000040)) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:52 executing program 2: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:52 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:52 executing program 5: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240)={0x0, 0x0, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:52 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240)={0x0, 0x0, 0x0, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:52 executing program 1: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:52 executing program 2: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:52 executing program 2: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:53 executing program 4: io_setup(0x0, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:53 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:53 executing program 5: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240)={0x0, 0x0, 0x0, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:53 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:53 executing program 1: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:53 executing program 2: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:54 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:54 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:54 executing program 5: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:54 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:54 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:54 executing program 1: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)={0x0, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:54 executing program 5: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:54 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:54 executing program 2: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:54 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:54 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:54 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:54 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:54 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:55 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:55 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:55 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:55 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:55 executing program 5: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:55 executing program 1: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)={0x0, 0x0, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:55 executing program 2: io_setup(0x7, &(0x7f0000000040)) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:55 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:55 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:55 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") [ 589.222275] audit: type=1326 audit(1536960655.621:129): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=15076 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 21:30:55 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:55 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") [ 589.459043] audit: type=1326 audit(1536960655.851:130): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=15081 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 21:30:56 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:56 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") [ 589.684739] audit: type=1326 audit(1536960656.081:131): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=15089 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 21:30:56 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:56 executing program 1: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)={0x0, 0x0, 0x0, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:56 executing program 5: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:56 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0x0, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:56 executing program 2: io_setup(0x7, &(0x7f0000000040)) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:56 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:57 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:57 executing program 1: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:57 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0x0, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:57 executing program 5: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:57 executing program 2: io_setup(0x7, &(0x7f0000000040)) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:57 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:58 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:58 executing program 1: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:58 executing program 5: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:58 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:58 executing program 2: io_setup(0x0, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:58 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:59 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:59 executing program 1: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:59 executing program 5: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)={0x0, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:59 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:59 executing program 2: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:59 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:30:59 executing program 2: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:59 executing program 2: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:59 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)={0x0, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:59 executing program 2: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:30:59 executing program 1: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:31:00 executing program 5: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)={0x0, 0x0, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:31:00 executing program 2: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:31:00 executing program 2: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:31:00 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:31:00 executing program 2: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:31:00 executing program 2: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:31:00 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:31:00 executing program 2: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:31:00 executing program 2: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:31:00 executing program 2: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:31:00 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)={0x0, 0x0, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:31:00 executing program 1: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:31:00 executing program 5: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)={0x0, 0x0, 0x0, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:31:00 executing program 2: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:31:00 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240)={0x0, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:31:01 executing program 2: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") [ 594.643650] audit: type=1326 audit(1536960661.041:132): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=15270 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 21:31:01 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:31:01 executing program 2: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") [ 594.889158] audit: type=1326 audit(1536960661.281:133): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=15279 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 21:31:01 executing program 2: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") [ 595.140338] audit: type=1326 audit(1536960661.531:134): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=15284 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 21:31:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000180)='em0\'wlan0\x00', 0x4) fstatfs(r0, &(0x7f00000001c0)=""/228) 21:31:01 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)={0x0, 0x0, 0x0, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:31:01 executing program 1: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:31:01 executing program 5: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:31:01 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) clone(0x210007fa, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000340)={'lo\x00', &(0x7f0000000080)=@ethtool_cmd={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x4]}}) 21:31:01 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240)={0x0, 0x0, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:31:02 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:31:02 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)={0x0, 0x0, 0x0, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:31:02 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240)={0x0, 0x0, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:31:02 executing program 1: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:31:02 executing program 5: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:31:02 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)={0x0, 0x0, 0x0, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:31:03 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240)={0x0, 0x0, 0x0, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:31:03 executing program 1: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:31:03 executing program 1: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:31:03 executing program 5: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:31:03 executing program 2: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) keyctl$set_reqkey_keyring(0x7, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) openat(0xffffffffffffffff, &(0x7f0000002840)='./file0\x00', 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0x8) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000080)) epoll_create(0x0) dup(0xffffffffffffffff) seccomp(0x0, 0x0, &(0x7f0000000100)) accept4(0xffffffffffffffff, &(0x7f0000000380)=@alg, &(0x7f0000000400)=0x80, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@multicast1, @in6=@remote}}, {{@in=@remote}}}, &(0x7f0000000340)=0x14b) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000640)={0xa0}, 0xa0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140), 0x4) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000440)={0x0, @speck128}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) getgroups(0x0, &(0x7f0000000340)) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000002880), 0x4) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000480)="facc09acd6d7e2de08d2f3b188768094", 0x10) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000100), 0x0) dup(0xffffffffffffffff) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f0000000080)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) getegid() 21:31:03 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:31:04 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:31:04 executing program 1: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) r0 = eventfd2(0x9493, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:31:04 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:31:04 executing program 5: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:31:04 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:31:05 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:31:05 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:31:05 executing program 1: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) r0 = eventfd2(0x0, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:31:05 executing program 5: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:31:05 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:31:12 executing program 2: keyctl$set_reqkey_keyring(0xf, 0xfffffffffffffffd) openat$null(0xffffffffffffff9c, &(0x7f0000000300)='/dev/null\x00', 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0x0) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000240)}) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000001c0)) chroot(&(0x7f0000000340)='./file0\x00') bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f00000000c0)='./file0\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb, &(0x7f00000003c0)='cifs.idmap\x00', 0xffffffffffffffff}, 0x30) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, "1ed80a039e270c23027eb3c58a8bc421ae74039212c11ee34390b7b38648dac3"}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f00000001c0)={&(0x7f0000000440)=ANY=[]}}, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f00000003c0)) epoll_create(0x0) getpgid(0x0) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240), 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000a40), &(0x7f0000000a80)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@mcast1}, &(0x7f0000000b80)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f00000002c0), 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x14}, 0x14}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000c00)={0x0, @multicast1, @broadcast}, &(0x7f0000002cc0)=0xc) 21:31:12 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:31:12 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:31:12 executing program 1: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) r0 = eventfd2(0x0, 0x0) fcntl$setpipe(r0, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:31:12 executing program 5: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:31:12 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:31:12 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:31:12 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:31:12 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:31:13 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:31:13 executing program 1: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) eventfd2(0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x8) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:31:13 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:31:38 executing program 2: pipe(&(0x7f00000000c0)) setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, &(0x7f0000000800)={0x0, {{0x2, 0x0, @broadcast}}}, 0x88) utime(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) inotify_init1(0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000080)) vmsplice(0xffffffffffffffff, &(0x7f0000000e40), 0x0, 0x0) sysinfo(&(0x7f0000000140)=""/235) getpgid(0xffffffffffffffff) socketpair(0x0, 0x0, 0x0, &(0x7f0000000480)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000440)) getpgrp(0x0) getpgrp(0xffffffffffffffff) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000040)) getpgid(0x0) syz_open_procfs(0x0, &(0x7f0000000400)='net/ip6_flowlabel\x00') dup2(0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000740)="2f7de3f80e8fc639258fea1e1d662f6e6574fc0053add0f82f"}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000003c0)=ANY=[], 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000240), &(0x7f00000003c0)=0xffffffe7) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a07b6969ef69dc00d9ce41ff0f183755477fde0f38211ac46844d8f28fe943ddb20f0000804e2179fbe54175450f2e1ac4010d64ac1e5d31a3b706c4a17de69a000000009f7f") getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000000200)=0xe8) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) prctl$setfpexc(0xc, 0x0) stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000600)) lstat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)) getresuid(&(0x7f0000003280), &(0x7f0000000780), &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) 21:31:38 executing program 5: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) eventfd2(0x0, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:31:38 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:31:38 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:31:38 executing program 1: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) eventfd2(0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:31:38 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:31:39 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:31:39 executing program 5: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) eventfd2(0x0, 0x0) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:31:39 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)={0x0, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:31:39 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:31:39 executing program 1: clone(0x200, &(0x7f0000005980), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000005940)) mknod(&(0x7f0000000400)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000340)='./file0\x00', &(0x7f0000000640), &(0x7f00000003c0)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000300)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) open$dir(&(0x7f00000007c0)='./file0\x00', 0x200000841, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f0000000440)=""/159) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @dev}, 0x10) ioctl$EVIOCGABS2F(r1, 0x8018456f, &(0x7f0000000500)=""/170) 21:31:40 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:32:04 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)={0x0, 0x0, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:32:04 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) eventfd2(0x0, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:32:04 executing program 1: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:32:04 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00007e5000)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) recvfrom(r1, &(0x7f0000003b80)=""/184, 0xb8, 0x0, &(0x7f0000000180)=@sco, 0x56) bind(r1, &(0x7f0000f70000)=@un=@file={0x1, './file0\x00'}, 0xa) write$P9_RATTACH(r2, &(0x7f00000000c0)={0xffffff84}, 0x14) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000340)) 21:32:04 executing program 5: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:32:04 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:32:04 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) sendto$inet6(r0, &(0x7f0000ba3ff4)="d0", 0x1, 0x0, &(0x7f000056dfe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 21:32:04 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000440)=0xee970200, 0x4) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000140)='cpuset.sched_load_balance\x00', 0x2, 0x0) write$cgroup_int(r2, &(0x7f0000000040), 0x12) 21:32:04 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000440)=0xee970200, 0x4) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000140)='cpuset.sched_load_balance\x00', 0x2, 0x0) write$cgroup_int(r2, &(0x7f0000000040), 0x12) 21:32:04 executing program 5: clock_gettime(0x7, &(0x7f0000000340)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) getpid() clock_getres(0x0, &(0x7f00000002c0)) pipe(&(0x7f00000005c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="af8055a0596969ef69dc00d99066410f60bad33f00007c2aaf200f382143fd64a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e6989f") openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080), &(0x7f00000003c0), 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f00000004c0), 0x0, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000140), 0x0, 0x0) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) 21:32:04 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:32:05 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0x1, 0x5, &(0x7f0000519fa8)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a00000017000000000000009500000000000000"], &(0x7f0000000200)="73797a6b616c6c65722c493d6c2b78db01beb8234b8301e2918b8b33e703f173263d15127d1c5309a0593d0f6dbe9cd5434619dfff6e61ba74ed3776315503f2d22b3ecd7a62819bc2345afd348344bed224a114267fd4cd1e55f8cf69c16cfffd3a4dc7721aacdfb55e39d507f86531752d2affc30318f5da65be34374a24f6", 0xfffffffffffffffa, 0x1000, &(0x7f00009ab000)=""/4096}, 0x48) r1 = socket(0x10, 0x3, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000040)=r0, 0x4) 21:32:05 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)={0x0, 0x0, 0x0, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:32:05 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) eventfd2(0x0, 0x0) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") [ 658.675343] audit: type=1400 audit(1536960725.071:135): avc: denied { prog_run } for pid=15560 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 21:32:05 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000001600)='/dev/loop#\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x81806) capset(&(0x7f00000000c0)={0x20071026}, &(0x7f0000000240)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = socket$packet(0x11, 0x3, 0x300) chdir(&(0x7f0000000000)='./file0\x00') ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f00000016c0)="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") bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffff9c, 0x10, &(0x7f0000000380)={&(0x7f0000000280)=""/252, 0xfc, 0x0}}, 0x10) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_SIOCADDDLCI(r1, 0x8980, &(0x7f0000000180)={'bcsh0\x00', 0x571}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={r3, 0x10, &(0x7f00000005c0)={&(0x7f0000000500)=""/188, 0xbc, r2}}, 0x10) r4 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000600)="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", 0x1000, r4) r5 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r5, 0x29, 0x45, &(0x7f0000001680)={"81700000008000"}, &(0x7f0000000100)=0xffffffffffffff64) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001640)={&(0x7f0000000140)='./file0\x00', r5}, 0x10) fchmod(r0, 0x10) [ 658.825922] capability: warning: `syz-executor1' uses deprecated v2 capabilities in a way that may be insecure 21:32:24 executing program 2: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:32:24 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)={0x0, 0x0, 0x0, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:32:24 executing program 1: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:32:24 executing program 5: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:32:24 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:32:24 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:32:25 executing program 5: munlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) getsockname(0xffffffffffffffff, &(0x7f00000001c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000040)=0x80) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) add_key(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000300), &(0x7f00000003c0), 0x0, 0xfffffffffffffff9) keyctl$revoke(0x3, 0x0) syz_open_procfs(0x0, &(0x7f0000000340)='schedstat\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f00000002c0)='./file0\x00'}, 0x10) setitimer(0x0, &(0x7f0000000500)={{0x77359400}, {0x77359400}}, &(0x7f0000000140)) recvmmsg(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000047c0)={0x77359400}) pipe(&(0x7f0000000180)) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") [ 678.600636] audit: type=1326 audit(1536960745.001:136): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=15594 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 21:32:25 executing program 5: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:32:25 executing program 1: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200)={0xf, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x8}, &(0x7f0000000240)={0x7, 0x5, 0x1, 0x100000000, 0x5, 0x6, 0x2, 0x2}, &(0x7f0000000280)={0x2, 0xc41e, 0x9, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) eventfd2(0x9493, 0x80000) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:32:25 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)={0x0, 0x0, 0x0, 0x1ff, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:32:25 executing program 5: rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f00000001c0), 0xffffffdb) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) clone(0x0, &(0x7f0000000300), &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000400)) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000240)="428055a032b6b6410f140506000000ff0f183736e35cf364dee5d2d2d5f2a60e0e097002dcc69f66410b850f00000062c463cd6829f3c4028d97a8587a8f6fee8f2a1812cc789471fac4e14bc22a49052d052d3b19fddd4008356d0000000000f047305cccb241801b00656464f3446da03333420f709427771a69a500e3c4c13b7c12c4b641dcfdc9c4427d1d1aa4212dfca50000262666430ffb348b1f7f") 21:32:25 executing program 1: munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x644200, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000080)={0x7fff}, 0x2) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:32:34 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:32:34 executing program 2: munmap(&(0x7f000018f000/0x1000)=nil, 0x1000) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000140)='/dev/keychord\x00', 0x40, 0x0) setsockopt$inet_buf(r0, 0x0, 0x3e, &(0x7f0000000200)="d4a86d8b089427a565476e700c6b55ce5991bc6c07906304b06ef22c62f2ab9115cbf5a0e04e63dc3e53262af6e2b27be96545b42675ea503cf762391198c0ae14d60a17d3842592d8615d6e018649992e100dbbe744715ae00e6363174073c797cd2bd2a07526fba11cb9258e9d231a1d07c081234d7f666d83e57b88b74ccac0ab4dd8ad83adde9fb383", 0x8b) write$P9_RFSYNC(r0, &(0x7f0000000180)={0x7, 0x33, 0x1}, 0x7) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000207, 0x10, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x0, 0x0) listen(r2, 0x8000000000000006) sendto$inet6(r1, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) close(r1) accept4(r2, 0x0, &(0x7f0000000300)=0xfffffffffffffd27, 0x0) setsockopt$inet_msfilter(r3, 0x0, 0x29, &(0x7f00000001c0)=ANY=[@ANYBLOB="ac1414bbac1414bb00ae16000000000000000001e0000002ffffffffe0000002"], 0x20) recvmmsg(r1, &(0x7f0000008d80)=[{{&(0x7f0000004b80)=@nl, 0x80, &(0x7f0000006100), 0x0, &(0x7f0000006140)=""/105, 0x69}}], 0x8000000000003bf, 0x0, 0x0) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:32:34 executing program 5: munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0ca24a3a3ef69dc0f01ee0db341cbff9191a33d062900c462fd32c70f993d233d234142d85d096b2179660f38302fbae5e5e575663ef340adc4010d64ac1e5d31a3b7e29873bb7f") syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") r0 = accept(0xffffffffffffff9c, &(0x7f0000000300)=@can, &(0x7f0000000380)=0x80) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000003c0)={'TPROXY\x00'}, &(0x7f0000000400)=0x1e) 21:32:34 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x5b, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:32:34 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:32:34 executing program 1: munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) r0 = open(&(0x7f0000000040)='./file0\x00', 0x20000, 0x22) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000140)={0x0, {{0xa, 0x4e24, 0x10000, @ipv4={[], [], @broadcast}, 0x1}}}, 0x88) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0ca0f38cd8702000000a3ef69dc0f01ee0dce3acbff9191a33d06290028770f0f993d233d23413666440f38218567c800006b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb24450f0ff4fb9a") r1 = syz_genetlink_get_family_id$nbd(&(0x7f00000000c0)='nbd\x00') r2 = syz_genetlink_get_family_id$fou(&(0x7f00000002c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, &(0x7f0000000480)={&(0x7f0000000300)={0x40, r2, 0x800, 0x70bd2b, 0x25dfdbff, {}, [@FOU_ATTR_TYPE={0x8, 0x4, 0x1}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_AF={0x8, 0x2, 0x2}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e21}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}, @FOU_ATTR_TYPE={0x8, 0x4, 0x2}]}, 0x40}, 0x1, 0x0, 0x0, 0x44000}, 0x40000) sendmsg$NBD_CMD_STATUS(r0, &(0x7f0000000600)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000340)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000", @ANYRES16=r1, @ANYBLOB="00002dbd7000fddbdf25050000000c000400ff030000000000000c000400ff010000000000000c000200e8000000000000000c00030003000000000000000c00060001000000000000000c00020000800000000000002c00070008000100", @ANYRES32=r0, @ANYBLOB="08010156001e1a965a23cc66", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32=r0, @ANYBLOB="5ea9ac0f", @ANYRES32=r0, @ANYBLOB="0c0006000300000000000000"], 0xd}, 0x1, 0x0, 0x0, 0x4010}, 0x91) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") fstat(r0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000580)={0x0, 0x0, 0x0}, &(0x7f00000005c0)=0xc) r5 = getuid() write$P9_RSTATu(r0, &(0x7f0000000680)={0x64, 0x7d, 0x2, {{0x0, 0x4b, 0x9, 0x2, {0x1a, 0x4, 0x1}, 0x2000000, 0x4b, 0x3f, 0xffffffffffffffc0, 0x11, 'em0vmnet1$}(wlan0', 0x0, "", 0x3, "956c6f", 0x4, 'fou\x00'}, 0x4, 'nbd\x00', r3, r4, r5}}, 0x64) 21:32:35 executing program 5: epoll_create1(0x80000) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:32:35 executing program 1: munmap(&(0x7f000018f000/0x1000)=nil, 0x1000) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000140)='/dev/keychord\x00', 0x40, 0x0) setsockopt$inet_buf(r0, 0x0, 0x3e, &(0x7f0000000200)="d4a86d8b089427a565476e700c6b55ce5991bc6c07906304b06ef22c62f2ab9115cbf5a0e04e63dc3e53262af6e2b27be96545b42675ea503cf762391198c0ae14d60a17d3842592d8615d6e018649992e100dbbe744715ae00e6363174073c797cd2bd2a07526fba11cb9258e9d231a1d07c081234d7f666d83e57b88b74ccac0ab4dd8ad83adde9fb383", 0x8b) write$P9_RFSYNC(r0, &(0x7f0000000180)={0x7, 0x33, 0x1}, 0x7) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000207, 0x10, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x0, 0x0) listen(r2, 0x8000000000000006) sendto$inet6(r1, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) close(r1) accept4(r2, 0x0, &(0x7f0000000300)=0xfffffffffffffd27, 0x0) setsockopt$inet_msfilter(r3, 0x0, 0x29, &(0x7f00000001c0)=ANY=[@ANYBLOB="ac1414bbac1414bb00ae16000000000000000001e0000002ffffffffe0000002"], 0x20) recvmmsg(r1, &(0x7f0000008d80)=[{{&(0x7f0000004b80)=@nl, 0x80, &(0x7f0000006100), 0x0, &(0x7f0000006140)=""/105, 0x69}}], 0x8000000000003bf, 0x0, 0x0) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:32:35 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:32:35 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:32:35 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:32:36 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x40200, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f00000000c0)='cpu.weight.nice\x00', 0x2, 0x0) r2 = dup3(r0, r1, 0x80000) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) fallocate(r0, 0x0, 0x1ff, 0x9) clone(0x1000a102001bfc, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair(0x8, 0xa, 0x2f67, &(0x7f0000000040)={0xffffffffffffffff}) fstat(r2, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r4) ioctl$TIOCSCTTY(r3, 0x540e, 0x7fffffff) write$P9_RMKDIR(r3, &(0x7f0000000200)={0x14, 0x49, 0x1, {0x20, 0x2, 0x5}}, 0x14) syz_execute_func(&(0x7f0000000180)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:32:36 executing program 0: mlockall(0xfffffffffffffffc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:32:59 executing program 2: munmap(&(0x7f000018f000/0x1000)=nil, 0x1000) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000140)='/dev/keychord\x00', 0x40, 0x0) setsockopt$inet_buf(r0, 0x0, 0x3e, &(0x7f0000000200)="d4a86d8b089427a565476e700c6b55ce5991bc6c07906304b06ef22c62f2ab9115cbf5a0e04e63dc3e53262af6e2b27be96545b42675ea503cf762391198c0ae14d60a17d3842592d8615d6e018649992e100dbbe744715ae00e6363174073c797cd2bd2a07526fba11cb9258e9d231a1d07c081234d7f666d83e57b88b74ccac0ab4dd8ad83adde9fb383", 0x8b) write$P9_RFSYNC(r0, &(0x7f0000000180)={0x7, 0x33, 0x1}, 0x7) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000207, 0x10, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x0, 0x0) listen(r2, 0x8000000000000006) sendto$inet6(r1, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) close(r1) accept4(r2, 0x0, &(0x7f0000000300)=0xfffffffffffffd27, 0x0) setsockopt$inet_msfilter(r3, 0x0, 0x29, &(0x7f00000001c0)=ANY=[@ANYBLOB="ac1414bbac1414bb00ae16000000000000000001e0000002ffffffffe0000002"], 0x20) recvmmsg(r1, &(0x7f0000008d80)=[{{&(0x7f0000004b80)=@nl, 0x80, &(0x7f0000006100), 0x0, &(0x7f0000006140)=""/105, 0x69}}], 0x8000000000003bf, 0x0, 0x0) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:32:59 executing program 1: munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x644d40, 0x0) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f0000000140)) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x400000, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000080)={'syzkaller1\x00', 0x400}) 21:32:59 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:32:59 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:32:59 executing program 5: munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_user\x00', 0x0, 0x0) setsockopt$inet_int(r0, 0x0, 0x1f, &(0x7f0000000080)=0x401, 0x4) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:32:59 executing program 0: mlockall(0xfffffffffffffffc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:32:59 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:32:59 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:32:59 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:33:00 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:33:00 executing program 5: syz_emit_ethernet(0x0, &(0x7f0000000400)=ANY=[], &(0x7f0000000040)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x19, &(0x7f0000000180)='securitybdev&em1trusted]\x00'}, 0x30) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000200)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000280)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000340)) getpgid(0xffffffffffffffff) syz_open_procfs$namespace(0x0, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="42805da0390fef69dc64f2476cce77fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b74575a771fb0703") 21:33:00 executing program 0: mlockall(0xfffffffffffffffc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:33:14 executing program 2: 21:33:14 executing program 1: 21:33:14 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:33:14 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:33:14 executing program 5: syz_emit_ethernet(0x0, &(0x7f0000000400)=ANY=[], &(0x7f0000000040)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x19, &(0x7f0000000180)='securitybdev&em1trusted]\x00'}, 0x30) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000200)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000280)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000340)) getpgid(0xffffffffffffffff) syz_open_procfs$namespace(0x0, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="42805da0390fef69dc64f2476cce77fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b74575a771fb0703") 21:33:14 executing program 0: mlockall(0x0) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:33:14 executing program 1: 21:33:14 executing program 1: 21:33:14 executing program 1: 21:33:14 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:33:14 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:33:14 executing program 1: 21:33:23 executing program 2: clone(0x7fd, 0x0, 0xfffffffffffffffe, 0xfffffffffffffffe, 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[], 0x0) 21:33:23 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:33:23 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:33:23 executing program 0: mlockall(0x0) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:33:23 executing program 5: syz_emit_ethernet(0x0, &(0x7f0000000400)=ANY=[], &(0x7f0000000040)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x19, &(0x7f0000000180)='securitybdev&em1trusted]\x00'}, 0x30) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000200)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000280)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000340)) getpgid(0xffffffffffffffff) syz_open_procfs$namespace(0x0, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="42805da0390fef69dc64f2476cce77fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b74575a771fb0703") 21:33:23 executing program 1: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000600000000000000000020009500000000f2ff00"], &(0x7f0000000080)="f30ffd5335000000000070e642c558d7429d727ce4cf", 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 21:33:23 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:33:23 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:33:23 executing program 0: mlockall(0x0) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:33:23 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:33:23 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:33:24 executing program 3: io_setup(0x7, &(0x7f0000000040)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:33:24 executing program 1: clock_gettime(0x806, &(0x7f0000000240)) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@mcast1, @in=@rand_addr}}, {{@in6=@remote}, 0x0, @in6}}, &(0x7f0000000200)=0xe8) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000380)) recvmmsg(0xffffffffffffffff, &(0x7f0000003ec0), 0x0, 0x0, &(0x7f00000040c0)) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000080)) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000004100)) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000140)={0x77359400}, &(0x7f00000001c0), 0x0) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000580)={{0x2, 0x0, @multicast1}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @dev}, 'nr0\x00'}) getgid() getgroups(0x0, &(0x7f00000003c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000500)) setresgid(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000600)={0x0, @multicast2, @loopback}, &(0x7f0000000640)=0xc) syz_execute_func(&(0x7f0000000480)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f9f") 21:33:34 executing program 2: mknod(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000140)=0x4) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) utime(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f00000003c0)={0x0, &(0x7f0000000380)}) pipe2(&(0x7f0000000280), 0x0) pselect6(0x40, &(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280)={&(0x7f0000000240), 0x8}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0cb0fef69dc0f01eef20f5ea10008804173fe19fa380f38211af7f081768cc8000000c481b587bc2b0000002167f00fbab204000000cac4827d0f0364410f57dec4817a11910000010075450f2e1ac4010d64ac1e5d31a3b744dbe22e26f265ddd6c4c1d9fb61e9") ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000400)) prlimit64(0x0, 0x0, &(0x7f0000000440), &(0x7f0000000480)) flock(0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 21:33:34 executing program 4: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:33:34 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:33:34 executing program 5: syz_emit_ethernet(0x0, &(0x7f0000000400)=ANY=[], &(0x7f0000000040)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x19, &(0x7f0000000180)='securitybdev&em1trusted]\x00'}, 0x30) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000200)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000280)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000340)) getpgid(0xffffffffffffffff) syz_open_procfs$namespace(0x0, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="42805da0390fef69dc64f2476cce77fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b74575a771fb0703") 21:33:34 executing program 3: io_setup(0x7, &(0x7f0000000040)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:33:34 executing program 1: clock_gettime(0x0, &(0x7f00000002c0)) getgroups(0x0, &(0x7f0000000080)) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) openat$keychord(0xffffffffffffff9c, &(0x7f0000000580)='/dev/keychord\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000640)={@mcast1}, &(0x7f0000000680)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000780)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000007c0)={{{@in=@local, @in=@dev}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000005d40)={@dev}, &(0x7f0000005d80)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000005dc0)={{{@in6=@mcast1, @in6=@mcast1}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000005ec0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000005fc0)={{{@in6=@dev, @in=@remote}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f00000060c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f00000061c0)={@mcast1}, &(0x7f0000006200)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000006240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000006280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000062c0)={{{@in=@multicast2, @in=@local}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@rand_addr}}, &(0x7f00000063c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000064c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@local}}, &(0x7f00000065c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000006640)={{{@in6=@dev, @in6=@local}}, {{@in=@multicast1}}}, &(0x7f0000006740)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000006780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000067c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000068c0)={{{@in6=@remote, @in6=@loopback}}, {{@in6=@mcast1}}}, &(0x7f00000069c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000006a00), &(0x7f0000006a40)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000006a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000006ac0)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000006b00)={@loopback}, &(0x7f0000006b40)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000006b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006bc0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006c00)={{{@in=@rand_addr, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000006d00)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000006dc0)={{{@in=@multicast1, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000006ec0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000007600)={&(0x7f00000005c0), 0xc, &(0x7f00000075c0)={&(0x7f0000006f00)=ANY=[]}}, 0x0) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)) setresgid(0x0, 0x0, 0x0) lchown(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) setitimer(0x0, &(0x7f0000000540)={{0x77359400}, {0x77359400}}, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000900)=ANY=[], 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000580), 0x0) open(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000480)="f9805da06a0f460f46dc0f01ee263a208600d7cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c43ef0470fbb4000d6adbe90dfe2987e") 21:33:34 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:33:34 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:33:34 executing program 1: munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) r0 = socket(0x4, 0xf3ea3fbe5f10767b, 0x30000000) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@loopback, @in=@remote}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000040)=0xe8) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:33:35 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:33:35 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:33:35 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:34:00 executing program 2: sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000440)) clock_gettime(0x0, &(0x7f0000000240)) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@mcast1, @in=@rand_addr}}, {{@in6=@remote}, 0x0, @in6}}, &(0x7f0000000200)=0xe8) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000380)) recvmmsg(0xffffffffffffffff, &(0x7f0000003ec0), 0x0, 0x0, &(0x7f00000040c0)) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000080)) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000004100)) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000140)={0x77359400}, &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) clock_gettime(0x0, &(0x7f00000003c0)) syz_execute_func(&(0x7f0000000480)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f9f") 21:34:00 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:34:00 executing program 5: syz_emit_ethernet(0x0, &(0x7f0000000400)=ANY=[], &(0x7f0000000040)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x19, &(0x7f0000000180)='securitybdev&em1trusted]\x00'}, 0x30) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000200)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000280)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000340)) getpgid(0xffffffffffffffff) syz_open_procfs$namespace(0x0, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 21:34:00 executing program 3: io_setup(0x7, &(0x7f0000000040)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:34:00 executing program 1: munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:34:00 executing program 4: socketpair(0x7, 0x806, 0xffffffff, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0x7, &(0x7f0000000200)={0xcb, 0x6, 0x800, 0x4}, 0x10) clone(0x400002102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") syz_execute_func(&(0x7f0000000140)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") r1 = socket$inet(0x2, 0x9, 0x2000000008009) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000040)) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x101000, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2000, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) 21:34:01 executing program 5: syz_emit_ethernet(0x0, &(0x7f0000000400)=ANY=[], &(0x7f0000000040)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x19, &(0x7f0000000180)='securitybdev&em1trusted]\x00'}, 0x30) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000200)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000280)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000340)) getpgid(0xffffffffffffffff) syz_open_procfs$namespace(0x0, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 21:34:01 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:34:01 executing program 5: syz_emit_ethernet(0x0, &(0x7f0000000400)=ANY=[], &(0x7f0000000040)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x19, &(0x7f0000000180)='securitybdev&em1trusted]\x00'}, 0x30) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000200)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000280)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000340)) getpgid(0xffffffffffffffff) syz_open_procfs$namespace(0x0, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 21:34:01 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$packet(0x11, 0x100000000003, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000000)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x3f4) ppoll(&(0x7f0000000040)=[{r1, 0x80}], 0x1, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0)={0x7b1d}, 0x8) 21:34:01 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:34:01 executing program 5: syz_emit_ethernet(0x0, &(0x7f0000000400)=ANY=[], &(0x7f0000000040)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x19, &(0x7f0000000180)='securitybdev&em1trusted]\x00'}, 0x30) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000200)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000280)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000340)) getpgid(0xffffffffffffffff) syz_open_procfs$namespace(0x0, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) syz_execute_func(&(0x7f0000000400)="42805da0390fef69dc64f2476cce77fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b74575a771fb0703") 21:34:09 executing program 2: syz_open_procfs$namespace(0x0, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f0000000140)) syz_execute_func(&(0x7f00000001c0)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 21:34:09 executing program 1: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000001500)) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f00000003c0)) clock_gettime(0x0, &(0x7f0000000040)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000001640)) fgetxattr(0xffffffffffffffff, &(0x7f00000004c0)=@known='security.SMACK64TRANSMUTE\x00', &(0x7f0000000500)=""/4096, 0x1000) mlock2(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001680)={{{@in6=@remote, @in6=@dev}}, {{}, 0x0, @in=@remote}}, &(0x7f0000001780)=0xe8) pipe2(&(0x7f0000001880), 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) flistxattr(0xffffffffffffffff, &(0x7f0000001580)=""/57, 0x39) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f0000000400)=""/119) clock_gettime(0x0, &(0x7f0000000240)) ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, &(0x7f00000017c0)) utimes(&(0x7f0000000140)='./file0\x00', &(0x7f0000000280)={{0x0, 0x2710}}) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000001800)) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) inotify_init1(0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f00000002c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000001540)) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000015c0)='/selinux/enforce\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000380)="af8055a0596969ef69dc00d99066410f60bad33f00007c2aaf200f382143fd64a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e6989f") openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000180)="42805da0be0fef69dc0f01eece73fe95fa380f38217f1af3f3817e768cc80000000081b5e5b42b00000021abf00fbab204000000cafc205bdae5e54175450f2e1ac4010d64ac1e5d31a3b73e670f530c2771fb0703") 21:34:09 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:34:09 executing program 3: io_setup(0x0, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:34:09 executing program 5: syz_emit_ethernet(0x0, &(0x7f0000000400)=ANY=[], &(0x7f0000000040)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x19, &(0x7f0000000180)='securitybdev&em1trusted]\x00'}, 0x30) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000200)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000280)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000340)) getpgid(0xffffffffffffffff) syz_open_procfs$namespace(0x0, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) syz_execute_func(&(0x7f0000000400)="42805da0390fef69dc64f2476cce77fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b74575a771fb0703") 21:34:09 executing program 4: clock_getres(0x6, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f0000000080)) pipe(&(0x7f0000000040)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000380)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000003c0)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000400), &(0x7f0000000580)=0x10) gettid() init_module(&(0x7f00000004c0)='%]cgroup#selinuxem0/em1[\x00', 0x19, &(0x7f0000000500)='$,\x00') gettid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000540)) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="42805da0be0fef69dc0f01eece73fec4e161763f380f38211af3f0817e768cc8000000000fd9595df00fbab204000000ca6b2979dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") getpgid(0x0) syz_execute_func(&(0x7f00000002c0)="428055a03b6969ef69dc00d9fbfb69203737c3397c05f3af1a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501eee00885c4227992dd289f9f") 21:34:09 executing program 5: syz_emit_ethernet(0x0, &(0x7f0000000400)=ANY=[], &(0x7f0000000040)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x19, &(0x7f0000000180)='securitybdev&em1trusted]\x00'}, 0x30) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000200)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000280)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000340)) getpgid(0xffffffffffffffff) syz_open_procfs$namespace(0x0, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) syz_execute_func(&(0x7f0000000400)="42805da0390fef69dc64f2476cce77fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b74575a771fb0703") [ 783.451058] audit: type=1326 audit(1536960849.851:137): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=15926 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 21:34:09 executing program 5: syz_emit_ethernet(0x0, &(0x7f0000000400)=ANY=[], &(0x7f0000000040)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x19, &(0x7f0000000180)='securitybdev&em1trusted]\x00'}, 0x30) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000200)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000280)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000340)) getpgid(0xffffffffffffffff) syz_open_procfs$namespace(0x0, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="42805da0390fef69dc64f2476cce77fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b74575a771fb0703") 21:34:10 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000001500)) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f00000003c0)) clock_gettime(0x0, &(0x7f0000000040)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000001640)) fgetxattr(0xffffffffffffffff, &(0x7f00000004c0)=@known='security.SMACK64TRANSMUTE\x00', &(0x7f0000000500)=""/4096, 0x1000) mlock2(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001680)={{{@in6=@remote, @in6=@dev}}, {{}, 0x0, @in=@remote}}, &(0x7f0000001780)=0xe8) pipe2(&(0x7f0000001880), 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) flistxattr(0xffffffffffffffff, &(0x7f0000001580)=""/57, 0x39) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f0000000400)=""/119) clock_gettime(0x0, &(0x7f0000000240)) ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, &(0x7f00000017c0)) utimes(&(0x7f0000000140)='./file0\x00', &(0x7f0000000280)={{0x0, 0x2710}}) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000001800)) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) inotify_init1(0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f00000002c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000001540)) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000015c0)='/selinux/enforce\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000001600)) syz_execute_func(&(0x7f0000000380)="af8055a0596969ef69dc00d99066410f60bad33f00007c2aaf200f382143fd64a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e6989f") openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000180)="42805da0be0fef69dc0f01eece73fe95fa380f38217f1af3f3817e768cc80000000081b5e5b42b00000021abf00fbab204000000cafc205bdae5e54175450f2e1ac4010d64ac1e5d31a3b73e670f530c2771fb0703") 21:34:10 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:34:10 executing program 1: munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet6(0xa, 0x6, 0x3) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuset.effective_cpus\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS64(r0, 0x4c05, &(0x7f0000000140)) [ 783.638056] audit: type=1326 audit(1536960850.031:138): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=15946 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 21:34:10 executing program 0: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") [ 783.852650] audit: type=1326 audit(1536960850.251:139): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=15960 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 21:34:32 executing program 2: munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0x80404509, &(0x7f0000000140)=""/174) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) write$UHID_CREATE2(r0, &(0x7f0000000200)={0xb, 'syz1\x00', 'syz0\x00', 'syz0\x00', 0xd8, 0x6, 0x140000000000, 0x0, 0x1, 0x1, "d506e75594d90a0ac28dad46d3ba521963fcce951d8b4b2183149422a2d738bbbd909284ef3f33d93d854560a60283c6b6b28ba0490a075e432c418c8b5ce73666c0b8c91f8dc88664f9580d640ccfd5e6146185eb73a2625f4e42f2706c001ce3862b11feb87752ede3b78bc6483c26d239e4b5952c7a2c7c6f4332ae9e212cc5432502bbb6282e158dad9117657a6052a5a37ab3f80ccf8ff6ff0aa8d8e59a4f3c722ecfa813eff1b1e3fa14f52e0680d4adb01b79385d8153d7c8a6776b6c9898670efaf0dc7d1eaf643c9e74c15e6c38d9ee3ec47239"}, 0x1f0) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") fsync(r0) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:34:32 executing program 4: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) lsetxattr$system_posix_acl(&(0x7f0000000480)='./file0\x00', &(0x7f00000009c0)="737973744fb01b40c828dc1226b337d4ee706f730700000063ffff61636365737300091bc1e89c476203285014056fad00000000000000000010000000000000002244fa25752208beb14ad0b0a2077963e32960a27a2a99fddf4d05fd174f9a40ac9f4d7e80325947832bd896ac727306cb58291a24e1c7a299f5129c96f7e03918e2b83b3371a7fe20e76a885a4be036ccbce2644819dc2bd529cb5ee15f20a26b", &(0x7f00000005c0)=ANY=[], 0x0, 0x0) clock_settime(0x0, &(0x7f00000001c0)={0x0, 0x989680}) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x0, 0x0, &(0x7f0000000340)={0x0, &(0x7f0000000380)}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000005c0)='team\x00') 21:34:32 executing program 0: munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x11) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x501100, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0xffffffffffffffff, 0x7fff, 0x8, 0x100}, {0x8, 0x8, 0x4, 0x1}, {0x7fffffff, 0x77c, 0x9, 0x1}]}) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:34:32 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:34:32 executing program 5: syz_emit_ethernet(0x0, &(0x7f0000000400)=ANY=[], &(0x7f0000000040)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x19, &(0x7f0000000180)='securitybdev&em1trusted]\x00'}, 0x30) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000200)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000280)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000340)) getpgid(0xffffffffffffffff) syz_open_procfs$namespace(0x0, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="42805da0390fef69dc64f2476cce77fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b74575a771fb0703") 21:34:32 executing program 1: syz_emit_ethernet(0x0, &(0x7f0000000400)=ANY=[], &(0x7f0000000040)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x19, &(0x7f0000000180)='securitybdev&em1trusted]\x00'}, 0x30) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000200)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000280)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000340)) getpgid(0xffffffffffffffff) syz_open_procfs$namespace(0x0, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="42805da0390fef69dc64f2476cce77fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b74575a771fb0703") 21:34:33 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:34:33 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:34:33 executing program 1: syz_emit_ethernet(0x0, &(0x7f0000000400)=ANY=[], &(0x7f0000000040)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x19, &(0x7f0000000180)='securitybdev&em1trusted]\x00'}, 0x30) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000200)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000280)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000340)) getpgid(0xffffffffffffffff) syz_open_procfs$namespace(0x0, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="42805da0390fef69dc64f2476cce77fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b74575a771fb0703") 21:34:33 executing program 5: syz_emit_ethernet(0x0, &(0x7f0000000400)=ANY=[], &(0x7f0000000040)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x19, &(0x7f0000000180)='securitybdev&em1trusted]\x00'}, 0x30) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000200)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000280)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000340)) getpgid(0xffffffffffffffff) syz_open_procfs$namespace(0x0, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="42805da0390fef69dc64f2476cce77fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b74575a771fb0703") 21:34:33 executing program 4: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) lsetxattr$system_posix_acl(&(0x7f0000000480)='./file0\x00', &(0x7f00000009c0)="737973744fb01b40c828dc1226b337d4ee706f730700000063ffff61636365737300091bc1e89c476203285014056fad00000000000000000010000000000000002244fa25752208beb14ad0b0a2077963e32960a27a2a99fddf4d05fd174f9a40ac9f4d7e80325947832bd896ac727306cb58291a24e1c7a299f5129c96f7e03918e2b83b3371a7fe20e76a885a4be036ccbce2644819dc2bd529cb5ee15f20a26b", &(0x7f00000005c0)=ANY=[], 0x0, 0x0) clock_settime(0x0, &(0x7f00000001c0)={0x0, 0x989680}) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x0, 0x0, &(0x7f0000000340)={0x0, &(0x7f0000000380)}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000005c0)='team\x00') 21:34:33 executing program 0: munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x11) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x501100, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0xffffffffffffffff, 0x7fff, 0x8, 0x100}, {0x8, 0x8, 0x4, 0x1}, {0x7fffffff, 0x77c, 0x9, 0x1}]}) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:34:56 executing program 2: wait4(0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x401870cb, &(0x7f0000000340)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000002c0)}) creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f00000002c0)) syz_execute_func(&(0x7f0000000440)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd25204e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 21:34:56 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:34:56 executing program 1: syz_emit_ethernet(0x0, &(0x7f0000000400)=ANY=[], &(0x7f0000000040)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x19, &(0x7f0000000180)='securitybdev&em1trusted]\x00'}, 0x30) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000200)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000280)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000340)) getpgid(0xffffffffffffffff) syz_open_procfs$namespace(0x0, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="42805da0390fef69dc64f2476cce77fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b74575a771fb0703") 21:34:56 executing program 5: syz_emit_ethernet(0x0, &(0x7f0000000400)=ANY=[], &(0x7f0000000040)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x19, &(0x7f0000000180)='securitybdev&em1trusted]\x00'}, 0x30) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000200)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000280)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000340)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="42805da0390fef69dc64f2476cce77fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b74575a771fb0703") 21:34:56 executing program 0: munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x11) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x501100, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0xffffffffffffffff, 0x7fff, 0x8, 0x100}, {0x8, 0x8, 0x4, 0x1}, {0x7fffffff, 0x77c, 0x9, 0x1}]}) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:34:56 executing program 4: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) lsetxattr$system_posix_acl(&(0x7f0000000480)='./file0\x00', &(0x7f00000009c0)="737973744fb01b40c828dc1226b337d4ee706f730700000063ffff61636365737300091bc1e89c476203285014056fad00000000000000000010000000000000002244fa25752208beb14ad0b0a2077963e32960a27a2a99fddf4d05fd174f9a40ac9f4d7e80325947832bd896ac727306cb58291a24e1c7a299f5129c96f7e03918e2b83b3371a7fe20e76a885a4be036ccbce2644819dc2bd529cb5ee15f20a26b", &(0x7f00000005c0)=ANY=[], 0x0, 0x0) clock_settime(0x0, &(0x7f00000001c0)={0x0, 0x989680}) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x0, 0x0, &(0x7f0000000340)={0x0, &(0x7f0000000380)}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000005c0)='team\x00') 21:34:56 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:34:56 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:34:56 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:34:56 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:34:56 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:34:56 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:35:20 executing program 1: syz_emit_ethernet(0x0, &(0x7f0000000400)=ANY=[], &(0x7f0000000040)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x19, &(0x7f0000000180)='securitybdev&em1trusted]\x00'}, 0x30) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000200)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000280)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000340)) getpgid(0xffffffffffffffff) syz_open_procfs$namespace(0x0, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 21:35:20 executing program 2: set_tid_address(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 21:35:20 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:35:20 executing program 5: syz_emit_ethernet(0x0, &(0x7f0000000400)=ANY=[], &(0x7f0000000040)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x19, &(0x7f0000000180)='securitybdev&em1trusted]\x00'}, 0x30) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000200)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000280)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000340)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="42805da0390fef69dc64f2476cce77fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b74575a771fb0703") 21:35:20 executing program 0: munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x11) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x501100, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0xffffffffffffffff, 0x7fff, 0x8, 0x100}, {0x8, 0x8, 0x4, 0x1}, {0x7fffffff, 0x77c, 0x9, 0x1}]}) 21:35:20 executing program 4: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) lsetxattr$system_posix_acl(&(0x7f0000000480)='./file0\x00', &(0x7f00000009c0)="737973744fb01b40c828dc1226b337d4ee706f730700000063ffff61636365737300091bc1e89c476203285014056fad00000000000000000010000000000000002244fa25752208beb14ad0b0a2077963e32960a27a2a99fddf4d05fd174f9a40ac9f4d7e80325947832bd896ac727306cb58291a24e1c7a299f5129c96f7e03918e2b83b3371a7fe20e76a885a4be036ccbce2644819dc2bd529cb5ee15f20a26b", &(0x7f00000005c0)=ANY=[], 0x0, 0x0) clock_settime(0x0, &(0x7f00000001c0)={0x0, 0x989680}) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x0, 0x0, &(0x7f0000000340)={0x0, &(0x7f0000000380)}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) 21:35:20 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:35:20 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:35:20 executing program 1: syz_emit_ethernet(0x0, &(0x7f0000000400)=ANY=[], &(0x7f0000000040)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x19, &(0x7f0000000180)='securitybdev&em1trusted]\x00'}, 0x30) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000200)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000280)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000340)) getpgid(0xffffffffffffffff) syz_open_procfs$namespace(0x0, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) [ 854.184866] audit: type=1326 audit(1536960920.581:140): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=16106 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 21:35:20 executing program 1: syz_emit_ethernet(0x0, &(0x7f0000000400)=ANY=[], &(0x7f0000000040)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x19, &(0x7f0000000180)='securitybdev&em1trusted]\x00'}, 0x30) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000200)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000280)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000340)) getpgid(0xffffffffffffffff) syz_open_procfs$namespace(0x0, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 21:35:20 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:35:20 executing program 0: munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") open(&(0x7f0000000040)='./file0\x00', 0x0, 0x11) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x501100, 0x0) [ 854.433676] audit: type=1326 audit(1536960920.831:141): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=16123 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 21:35:20 executing program 1: syz_emit_ethernet(0x0, &(0x7f0000000400)=ANY=[], &(0x7f0000000040)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x19, &(0x7f0000000180)='securitybdev&em1trusted]\x00'}, 0x30) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000200)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000280)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000340)) getpgid(0xffffffffffffffff) syz_open_procfs$namespace(0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000400)="42805da0390fef69dc64f2476cce77fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b74575a771fb0703") 21:35:43 executing program 3: io_setup(0x7, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 21:35:43 executing program 2: mlockall(0x0) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) lsetxattr$system_posix_acl(&(0x7f0000000480)='./file0\x00', &(0x7f00000009c0)="737973744fb01b40c828dc1226b337d4ee706f730700000063ffff61636365737300091bc1e89c476203285014056fad00000000000000000010000000000000002244fa25752208beb14ad0b0a2077963e32960a27a2a99fddf4d05fd174f9a40ac9f4d7e80325947832bd896ac727306cb58291a24e1c7a299f5129c96f7e03918e2b83b3371a7fe20e76a885a4be036ccbce2644819dc2bd529cb5ee15f20a26b", &(0x7f00000005c0)=ANY=[], 0x0, 0x0) clock_settime(0x0, &(0x7f00000001c0)={0x0, 0x989680}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 21:35:43 executing program 1: syz_emit_ethernet(0x0, &(0x7f0000000400)=ANY=[], &(0x7f0000000040)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x19, &(0x7f0000000180)='securitybdev&em1trusted]\x00'}, 0x30) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000200)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000280)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000340)) getpgid(0xffffffffffffffff) syz_open_procfs$namespace(0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000400)="42805da0390fef69dc64f2476cce77fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b74575a771fb0703") 21:35:43 executing program 0: munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") open(&(0x7f0000000040)='./file0\x00', 0x0, 0x11) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x501100, 0x0) 21:35:43 executing program 5: syz_emit_ethernet(0x0, &(0x7f0000000400)=ANY=[], &(0x7f0000000040)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x19, &(0x7f0000000180)='securitybdev&em1trusted]\x00'}, 0x30) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000200)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000280)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000340)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="42805da0390fef69dc64f2476cce77fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b74575a771fb0703") 21:35:43 executing program 4: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) lsetxattr$system_posix_acl(&(0x7f0000000480)='./file0\x00', &(0x7f00000009c0)="737973744fb01b40c828dc1226b337d4ee706f730700000063ffff61636365737300091bc1e89c476203285014056fad00000000000000000010000000000000002244fa25752208beb14ad0b0a2077963e32960a27a2a99fddf4d05fd174f9a40ac9f4d7e80325947832bd896ac727306cb58291a24e1c7a299f5129c96f7e03918e2b83b3371a7fe20e76a885a4be036ccbce2644819dc2bd529cb5ee15f20a26b", &(0x7f00000005c0)=ANY=[], 0x0, 0x0) clock_settime(0x0, &(0x7f00000001c0)={0x0, 0x989680}) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x0, 0x0, &(0x7f0000000340)={0x0, &(0x7f0000000380)}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) 21:35:43 executing program 1: syz_emit_ethernet(0x0, &(0x7f0000000400)=ANY=[], &(0x7f0000000040)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x19, &(0x7f0000000180)='securitybdev&em1trusted]\x00'}, 0x30) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000200)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000280)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000340)) getpgid(0xffffffffffffffff) syz_open_procfs$namespace(0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000400)="42805da0390fef69dc64f2476cce77fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b74575a771fb0703") [ 876.726119] audit: type=1326 audit(1536960943.121:142): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=16156 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 21:35:43 executing program 1: syz_emit_ethernet(0x0, &(0x7f0000000400)=ANY=[], &(0x7f0000000040)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x19, &(0x7f0000000180)='securitybdev&em1trusted]\x00'}, 0x30) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000200)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000280)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000340)) getpgid(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="42805da0390fef69dc64f2476cce77fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b74575a771fb0703") 21:35:43 executing program 3: io_getevents(0x0, 0x0, 0x0, &(0x7f0000000c80), &(0x7f0000000d00)={0x77359400}) socket$inet_udplite(0x2, 0x2, 0x88) socket$key(0xf, 0x3, 0x2) connect(0xffffffffffffffff, &(0x7f0000000340)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x200002, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00'}) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f0000000140)) timer_create(0x0, &(0x7f0000000040), &(0x7f0000000240)) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) clock_gettime(0x0, &(0x7f0000001680)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) request_key(&(0x7f0000000080)='user\x00', &(0x7f00000000c0), &(0x7f00000001c0)='\x00', 0xfffffffffffffffa) add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") 21:35:43 executing program 0: munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") open(&(0x7f0000000040)='./file0\x00', 0x0, 0x11) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x501100, 0x0) 21:35:43 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000140), &(0x7f0000000200), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000040)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000080), 0x4) syz_execute_func(&(0x7f0000000240)="428055a032b6b6410f140506000000ff0f183736e35cf364dee5d2d2d5f2a60e0e0970020fe9c09f66410b850f00000062c463cd6829f3c4028d97a8587a8f6fee8f2a1812cc789471fac4e14bc22a49052d052d3b19fddd4008356d0000000000f047305cccb241801b00656464f3446da03333420f709427771a69a500e3c4c13b7c12c4b641dcfdc9c4427d1d1aa4212dfca50000262666430ffb348b1f7f") ioctl$RTC_UIE_OFF(0xffffffffffffffff, 0x7004) 21:35:43 executing program 0: munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x11) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0xffffffffffffffff, 0x7fff, 0x8, 0x100}, {0x8, 0x8, 0x4, 0x1}, {0x7fffffff, 0x77c, 0x9, 0x1}]}) 21:35:43 executing program 4: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) lsetxattr$system_posix_acl(&(0x7f0000000480)='./file0\x00', &(0x7f00000009c0)="737973744fb01b40c828dc1226b337d4ee706f730700000063ffff61636365737300091bc1e89c476203285014056fad00000000000000000010000000000000002244fa25752208beb14ad0b0a2077963e32960a27a2a99fddf4d05fd174f9a40ac9f4d7e80325947832bd896ac727306cb58291a24e1c7a299f5129c96f7e03918e2b83b3371a7fe20e76a885a4be036ccbce2644819dc2bd529cb5ee15f20a26b", &(0x7f00000005c0)=ANY=[], 0x0, 0x0) clock_settime(0x0, &(0x7f00000001c0)={0x0, 0x989680}) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x0, 0x0, &(0x7f0000000340)={0x0, &(0x7f0000000380)}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) 21:36:08 executing program 2: wait4(0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x401870cb, &(0x7f0000000340)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000002c0)}) creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f00000002c0)) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000380)={0x0, @aes256}) accept4$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) syz_execute_func(&(0x7f0000000440)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd25204e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 21:36:08 executing program 0: munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x11) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0xffffffffffffffff, 0x7fff, 0x8, 0x100}, {0x8, 0x8, 0x4, 0x1}, {0x7fffffff, 0x77c, 0x9, 0x1}]}) 21:36:08 executing program 5: syz_emit_ethernet(0x0, &(0x7f0000000400)=ANY=[], &(0x7f0000000040)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x19, &(0x7f0000000180)='securitybdev&em1trusted]\x00'}, 0x30) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000200)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000280)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000340)) syz_open_procfs$namespace(0x0, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="42805da0390fef69dc64f2476cce77fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b74575a771fb0703") 21:36:08 executing program 1: syz_emit_ethernet(0x0, &(0x7f0000000400)=ANY=[], &(0x7f0000000040)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x19, &(0x7f0000000180)='securitybdev&em1trusted]\x00'}, 0x30) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000200)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000280)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000340)) getpgid(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="42805da0390fef69dc64f2476cce77fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b74575a771fb0703") 21:36:08 executing program 4: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) lsetxattr$system_posix_acl(&(0x7f0000000480)='./file0\x00', &(0x7f00000009c0)="737973744fb01b40c828dc1226b337d4ee706f730700000063ffff61636365737300091bc1e89c476203285014056fad00000000000000000010000000000000002244fa25752208beb14ad0b0a2077963e32960a27a2a99fddf4d05fd174f9a40ac9f4d7e80325947832bd896ac727306cb58291a24e1c7a299f5129c96f7e03918e2b83b3371a7fe20e76a885a4be036ccbce2644819dc2bd529cb5ee15f20a26b", &(0x7f00000005c0)=ANY=[], 0x0, 0x0) clock_settime(0x0, &(0x7f00000001c0)={0x0, 0x989680}) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x0, 0x0, &(0x7f0000000340)={0x0, &(0x7f0000000380)}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") syz_genetlink_get_family_id$team(&(0x7f00000005c0)='team\x00') 21:36:08 executing program 3: wait4(0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x401870cb, &(0x7f0000000340)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000002c0)}) creat(&(0x7f0000000040)='./file0\x00', 0x0) syz_execute_func(&(0x7f0000000440)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd25204e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 21:36:08 executing program 3: wait4(0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x401870cb, &(0x7f0000000340)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000002c0)}) creat(&(0x7f0000000040)='./file0\x00', 0x0) syz_execute_func(&(0x7f0000000440)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd25204e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 21:36:08 executing program 0: munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x11) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0xffffffffffffffff, 0x7fff, 0x8, 0x100}, {0x8, 0x8, 0x4, 0x1}, {0x7fffffff, 0x77c, 0x9, 0x1}]}) 21:36:08 executing program 3: wait4(0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x401870cb, &(0x7f0000000340)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000002c0)}) creat(&(0x7f0000000040)='./file0\x00', 0x0) syz_execute_func(&(0x7f0000000440)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd25204e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 21:36:08 executing program 0: munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x501100, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0xffffffffffffffff, 0x7fff, 0x8, 0x100}, {0x8, 0x8, 0x4, 0x1}, {0x7fffffff, 0x77c, 0x9, 0x1}]}) 21:36:08 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) write$cgroup_pid(r1, &(0x7f0000000080), 0x12) 21:36:09 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000140)}) request_key(&(0x7f00000006c0)='blacklist\x00', &(0x7f0000000700), &(0x7f0000000740)='\x00', 0xfffffffffffffff9) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000500)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f0000000540)=0x10) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) mlock(&(0x7f0000ffe000/0x1000)=nil, 0x1000) add_key(&(0x7f00000003c0)='encrypted\x00', &(0x7f0000000400), &(0x7f0000000440), 0x0, 0xfffffffffffffffc) request_key(&(0x7f0000000300)='user\x00', &(0x7f0000000340), &(0x7f0000000380)='\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000780)) getresuid(&(0x7f0000000800), &(0x7f0000000840), &(0x7f0000000880)) lstat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)) getuid() geteuid() getgroups(0x0, &(0x7f0000000980)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) getgid() getegid() getegid() getgroups(0x0, &(0x7f0000000b00)) getresgid(&(0x7f0000000b40), &(0x7f0000000b80), &(0x7f0000000bc0)) getgid() getegid() setxattr$system_posix_acl(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='system.posix_acl_default\x00', &(0x7f0000000c00), 0x24, 0x0) pipe2(&(0x7f0000000040), 0x0) unshare(0x0) mlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000280)={0x0, @rand_addr, 0x0, 0x0, 'lblc\x00'}, 0x2c) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f00000004c0), 0x4) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") INIT: Id "1" respawning too fast: disabled for 5 minutes 21:36:30 executing program 2: rt_sigprocmask(0x0, &(0x7f0000000140), &(0x7f0000000200), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept$inet6(0xffffffffffffff9c, 0x0, &(0x7f0000000040)) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) recvmmsg(0xffffffffffffffff, &(0x7f0000006980), 0x0, 0x0, &(0x7f0000006b80)={0x0, 0x1c9c380}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000007380)={'icmp6\x00'}, &(0x7f00000073c0)=0x1e) syz_genetlink_get_family_id$team(&(0x7f00000051c0)='team\x00') sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000007340)={&(0x7f0000005180), 0xc, &(0x7f0000006bc0)={&(0x7f0000006cc0)=ANY=[]}}, 0x0) syz_execute_func(&(0x7f0000000240)="428055a032b6b6410f140506000000ff0f183736e35cf364dee5d2d2d5f2a60e0e0970020fe9c09f66410b850f00000062c463cd6829f3c4028d97a8587a8f6fee8f2a1812cc789471fac4e14bc22a49052d052d3b19fddd4008356d0000000000f047305cccb241801b00656464f3446da03333420f709427771a69a500e3c4c13b7c12c4b641dcfdc9c4427d1d1aa4212dfca50000262666430ffb348b1f7f") 21:36:30 executing program 0: munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x501100, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0xffffffffffffffff, 0x7fff, 0x8, 0x100}, {0x8, 0x8, 0x4, 0x1}, {0x7fffffff, 0x77c, 0x9, 0x1}]}) 21:36:30 executing program 5: syz_emit_ethernet(0x0, &(0x7f0000000400)=ANY=[], &(0x7f0000000040)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x19, &(0x7f0000000180)='securitybdev&em1trusted]\x00'}, 0x30) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000200)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000280)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000340)) syz_open_procfs$namespace(0x0, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="42805da0390fef69dc64f2476cce77fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b74575a771fb0703") 21:36:30 executing program 1: syz_emit_ethernet(0x0, &(0x7f0000000400)=ANY=[], &(0x7f0000000040)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x19, &(0x7f0000000180)='securitybdev&em1trusted]\x00'}, 0x30) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000200)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000280)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000340)) getpgid(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="42805da0390fef69dc64f2476cce77fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b74575a771fb0703") 21:36:30 executing program 4: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) lsetxattr$system_posix_acl(&(0x7f0000000480)='./file0\x00', &(0x7f00000009c0)="737973744fb01b40c828dc1226b337d4ee706f730700000063ffff61636365737300091bc1e89c476203285014056fad00000000000000000010000000000000002244fa25752208beb14ad0b0a2077963e32960a27a2a99fddf4d05fd174f9a40ac9f4d7e80325947832bd896ac727306cb58291a24e1c7a299f5129c96f7e03918e2b83b3371a7fe20e76a885a4be036ccbce2644819dc2bd529cb5ee15f20a26b", &(0x7f00000005c0)=ANY=[], 0x0, 0x0) clock_settime(0x0, &(0x7f00000001c0)={0x0, 0x989680}) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x0, 0x0, &(0x7f0000000340)={0x0, &(0x7f0000000380)}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") syz_genetlink_get_family_id$team(&(0x7f00000005c0)='team\x00') 21:36:30 executing program 3: keyctl$set_reqkey_keyring(0x2, 0x0) clock_gettime(0x0, &(0x7f0000000400)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)=0xffffffffffffffff, 0x4) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000740)='cgroup.threads\x00', 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0), 0xc, &(0x7f0000000380)={&(0x7f0000000300)=ANY=[]}}, 0x0) pipe(&(0x7f0000000180)) flock(0xffffffffffffffff, 0x0) chroot(&(0x7f0000000040)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ptrace$peekuser(0x3, 0x0, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000280)={'nr0\x00', {0x2, 0x0, @dev}}) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000540)) getresgid(&(0x7f0000000440), &(0x7f0000000640), &(0x7f00000006c0)) getresuid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000009c0), &(0x7f0000000a00)=0xc) getresuid(&(0x7f0000000a40), &(0x7f0000000a80), &(0x7f0000000ac0)) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@multicast1, @in=@remote}}, {{@in=@rand_addr}, 0x0, @in=@multicast2}}, &(0x7f0000000c00)=0xe8) getresgid(&(0x7f0000000c40), &(0x7f0000000c80), &(0x7f0000000cc0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d00)={{{@in=@dev, @in6=@local}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000e00)=0xe8) getresgid(&(0x7f0000000e40), &(0x7f0000000e80), &(0x7f0000000ec0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003b00)={{{@in6=@dev, @in=@remote}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000003c00)=0xe8) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003c40)={{{@in6=@remote, @in=@dev}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000003d40)=0xe8) getresgid(&(0x7f0000003d80), &(0x7f0000003dc0), &(0x7f0000003e00)) getresuid(&(0x7f00000055c0), &(0x7f0000005600), &(0x7f0000005640)) stat(&(0x7f0000005680)='./file0\x00', &(0x7f00000056c0)) fstat(0xffffffffffffffff, &(0x7f0000005b40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005bc0), &(0x7f0000005c00)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000005c40)={{{@in6=@ipv4, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000005d40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000005d80)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000006740)={{{@in=@local, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, &(0x7f0000006840)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") memfd_create(&(0x7f0000000680)='}userloem0!,\x00', 0x0) syz_execute_func(&(0x7f00000005c0)="428055a03767db11ffaa32233333664200ce41a30f7f7f3766460f3828257844c19086d962788f35c935c97d197a0779fb66420f79c679aae1460f0da11b000000fbfb6e0f8e01000000f2ad7f") 21:36:30 executing program 3: wait4(0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x401870cb, &(0x7f0000000340)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000002c0)}) creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f00000002c0)) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000380)={0x0, @aes256}) syz_execute_func(&(0x7f0000000440)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd25204e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 21:36:30 executing program 0: munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x501100, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0xffffffffffffffff, 0x7fff, 0x8, 0x100}, {0x8, 0x8, 0x4, 0x1}, {0x7fffffff, 0x77c, 0x9, 0x1}]}) 21:36:31 executing program 3: wait4(0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x401870cb, &(0x7f0000000340)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000002c0)}) creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f00000002c0)) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000380)={0x0, @aes256}) syz_execute_func(&(0x7f0000000440)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd25204e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 21:36:31 executing program 0: munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x11) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x501100, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0xffffffffffffffff, 0x7fff, 0x8, 0x100}, {0x8, 0x8, 0x4, 0x1}, {0x7fffffff, 0x77c, 0x9, 0x1}]}) INIT: Id "3" respawning too fast: disabled for 5 minutes 21:36:31 executing program 3: wait4(0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x401870cb, &(0x7f0000000340)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000002c0)}) creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f00000002c0)) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000380)={0x0, @aes256}) syz_execute_func(&(0x7f0000000440)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd25204e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 21:36:31 executing program 0: munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x11) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x501100, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0xffffffffffffffff, 0x7fff, 0x8, 0x100}, {0x8, 0x8, 0x4, 0x1}, {0x7fffffff, 0x77c, 0x9, 0x1}]}) INIT: Id "5" respawning too fast: disabled for 5 minutes INIT: Id "4" respawning too fast: disabled for 5 minutes INIT: Id "6" respawning too fast: disabled for 5 minutes INIT: Id "2" respawning too fast: disabled for 5 minutes 21:36:53 executing program 3: wait4(0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x401870cb, &(0x7f0000000340)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000002c0)}) creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f00000002c0)) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000380)={0x0, @aes256}) syz_execute_func(&(0x7f0000000440)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd25204e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 21:36:53 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000000140)=[{{&(0x7f00000001c0)=@sco, 0x80, &(0x7f0000000500), 0x0, &(0x7f0000000580)=""/246, 0x416}}], 0x3b1, 0x0, &(0x7f00000044c0)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) clone(0x1ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) connect$inet6(r2, &(0x7f0000000080), 0x1c) r3 = dup2(r2, r2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000540), 0xcf53e35) write$9p(r3, &(0x7f0000000440), 0x0) close(r0) 21:36:53 executing program 0: munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x11) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x501100, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0xffffffffffffffff, 0x7fff, 0x8, 0x100}, {0x8, 0x8, 0x4, 0x1}, {0x7fffffff, 0x77c, 0x9, 0x1}]}) 21:36:53 executing program 1: syz_emit_ethernet(0x0, &(0x7f0000000400)=ANY=[], &(0x7f0000000040)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x19, &(0x7f0000000180)='securitybdev&em1trusted]\x00'}, 0x30) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000200)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000280)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000340)) syz_open_procfs$namespace(0x0, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="42805da0390fef69dc64f2476cce77fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b74575a771fb0703") 21:36:53 executing program 4: mlockall(0xfffffffffffffffc) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000940)) geteuid() getresuid(&(0x7f0000000900), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000900), &(0x7f0000000980)) lsetxattr$system_posix_acl(&(0x7f0000000480)='./file0\x00', &(0x7f00000009c0)="737973744fb01b40c828dc1226b337d4ee706f730700000063ffff61636365737300091bc1e89c476203285014056fad00000000000000000010000000000000002244fa25752208beb14ad0b0a2077963e32960a27a2a99fddf4d05fd174f9a40ac9f4d7e80325947832bd896ac727306cb58291a24e1c7a299f5129c96f7e03918e2b83b3371a7fe20e76a885a4be036ccbce2644819dc2bd529cb5ee15f20a26b", &(0x7f00000005c0)=ANY=[], 0x0, 0x0) clock_settime(0x0, &(0x7f00000001c0)={0x0, 0x989680}) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x0, 0x0, &(0x7f0000000340)={0x0, &(0x7f0000000380)}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") syz_genetlink_get_family_id$team(&(0x7f00000005c0)='team\x00') 21:36:53 executing program 5: syz_emit_ethernet(0x0, &(0x7f0000000400)=ANY=[], &(0x7f0000000040)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x19, &(0x7f0000000180)='securitybdev&em1trusted]\x00'}, 0x30) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000200)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000280)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000340)) syz_open_procfs$namespace(0x0, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="42805da0390fef69dc64f2476cce77fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b74575a771fb0703") 21:36:53 executing program 0: munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x11) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x501100, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0xffffffffffffffff, 0x7fff, 0x8, 0x100}, {0x8, 0x8, 0x4, 0x1}, {0x7fffffff, 0x77c, 0x9, 0x1}]}) 21:36:53 executing program 0: munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x11) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x501100, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0xffffffffffffffff, 0x7fff, 0x8, 0x100}, {0x8, 0x8, 0x4, 0x1}, {0x7fffffff, 0x77c, 0x9, 0x1}]}) 21:36:53 executing program 0: munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x11) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x501100, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0xffffffffffffffff, 0x7fff, 0x8, 0x100}, {0x8, 0x8, 0x4, 0x1}, {0x7fffffff, 0x77c, 0x9, 0x1}]}) 21:36:53 executing program 3: wait4(0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x401870cb, &(0x7f0000000340)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000002c0)}) creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f00000002c0)) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000380)={0x0, @aes256}) 21:36:53 executing program 0: munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x11) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x501100, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0xffffffffffffffff, 0x7fff, 0x8, 0x100}, {0x8, 0x8, 0x4, 0x1}, {0x7fffffff, 0x77c, 0x9, 0x1}]}) 21:36:54 executing program 1: syz_emit_ethernet(0x0, &(0x7f0000000400)=ANY=[], &(0x7f0000000040)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x19, &(0x7f0000000180)='securitybdev&em1trusted]\x00'}, 0x30) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000200)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000280)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000340)) syz_open_procfs$namespace(0x0, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="42805da0390fef69dc64f2476cce77fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b74575a771fb0703") 21:36:54 executing program 5: syz_emit_ethernet(0x0, &(0x7f0000000400)=ANY=[], &(0x7f0000000040)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x19, &(0x7f0000000180)='securitybdev&em1trusted]\x00'}, 0x30) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000200)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000280)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) getpgid(0xffffffffffffffff) syz_open_procfs$namespace(0x0, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="42805da0390fef69dc64f2476cce77fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b74575a771fb0703") [ 1144.800192] INFO: task syz-executor2:16382 blocked for more than 140 seconds. [ 1144.807536] Not tainted 4.14.69+ #5 [ 1144.840049] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1144.848041] syz-executor2 D29728 16382 1848 0x00000004 [ 1144.910618] Call Trace: [ 1144.913255] ? __schedule+0x729/0x1ed0 [ 1144.917144] ? __sched_text_start+0x8/0x8 [ 1144.960056] ? lock_downgrade+0x560/0x560 [ 1144.970075] schedule+0x7f/0x1b0 [ 1144.973453] __lock_sock+0x11d/0x210 [ 1145.010072] ? sock_def_readable+0x3f0/0x3f0 [ 1145.014586] ? wait_woken+0x270/0x270 [ 1145.058878] lock_sock_nested+0xe3/0x100 [ 1145.080057] tcp_sendmsg+0x1c/0x40 [ 1145.083620] inet_sendmsg+0x168/0x540 [ 1145.087413] ? inet_recvmsg+0x560/0x560 [ 1145.140064] sock_sendmsg+0xb5/0x100 [ 1145.143828] sock_write_iter+0x209/0x350 [ 1145.147882] ? sock_sendmsg+0x100/0x100 [ 1145.190069] ? inode_has_perm.isra.21+0x106/0x160 [ 1145.210057] __vfs_write+0x417/0x5c0 [ 1145.213781] ? kernel_read+0x110/0x110 [ 1145.258168] ? selinux_file_permission+0x79/0x440 [ 1145.290061] ? security_file_permission+0x88/0x1e0 [ 1145.295015] vfs_write+0x17f/0x4d0 [ 1145.298562] SyS_write+0xc2/0x1a0 [ 1145.340066] ? SyS_read+0x1a0/0x1a0 [ 1145.343703] ? security_file_ioctl+0x7c/0xb0 [ 1145.348106] ? do_syscall_64+0x43/0x4b0 [ 1145.390051] ? SyS_read+0x1a0/0x1a0 [ 1145.393705] do_syscall_64+0x19b/0x4b0 [ 1145.397590] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1145.440088] RIP: 0033:0x4572d9 [ 1145.443296] RSP: 002b:00007f46ab1ebc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1145.480067] RAX: ffffffffffffffda RBX: 00007f46ab1ec6d4 RCX: 00000000004572d9 [ 1145.487345] RDX: 0000000000000000 RSI: 0000000020000440 RDI: 0000000000000005 [ 1145.550046] RBP: 00000000009301e0 R08: 0000000000000000 R09: 0000000000000000 [ 1145.557328] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 1145.620048] R13: 00000000004d7d10 R14: 00000000004caab8 R15: 0000000000000002 [ 1145.647638] [ 1145.647638] Showing all locks held in the system: [ 1145.680056] 1 lock held by khungtaskd/23: [ 1145.684233] #0: (tasklist_lock){.+.+}, at: [] debug_show_all_locks+0x74/0x20f [ 1145.693311] 2 locks held by getty/1758: [ 1145.697276] #0: (&tty->ldisc_sem){++++}, at: [] tty_ldisc_ref_wait+0x20/0x80 [ 1145.706238] #1: (&ldata->atomic_read_lock){+.+.}, at: [] n_tty_read+0x1ff/0x15e0 [ 1145.715680] [ 1145.717299] ============================================= [ 1145.717299] [ 1145.900047] NMI backtrace for cpu 1 [ 1145.903719] CPU: 1 PID: 23 Comm: khungtaskd Not tainted 4.14.69+ #5 [ 1145.910112] Call Trace: [ 1145.912697] dump_stack+0xb9/0x11b [ 1145.916232] ? irq_force_complete_move.cold.3+0x64/0x64 [ 1145.921588] nmi_cpu_backtrace.cold.0+0x47/0x85 [ 1145.926279] ? irq_force_complete_move.cold.3+0x64/0x64 [ 1145.931634] nmi_trigger_cpumask_backtrace+0x121/0x146 [ 1145.936952] watchdog+0x574/0xa70 [ 1145.940410] ? reset_hung_task_detector+0x10/0x10 [ 1145.945243] kthread+0x348/0x420 [ 1145.948611] ? kthread_create_on_node+0xe0/0xe0 [ 1145.953299] ret_from_fork+0x3a/0x50 [ 1145.957136] Sending NMI from CPU 1 to CPUs 0: [ 1145.961951] NMI backtrace for cpu 0 [ 1145.961955] CPU: 0 PID: 4804 Comm: syz-executor5 Not tainted 4.14.69+ #5 [ 1145.961958] task: ffff88012473de00 task.stack: ffff880123c80000 [ 1145.961961] RIP: 0010:__secure_computing+0x6/0x310 [ 1145.961964] RSP: 0018:ffff880123c87de8 EFLAGS: 00000297 [ 1145.961969] RAX: ffff88012473de00 RBX: ffff880123c87f58 RCX: 0000000000000000 [ 1145.961972] RDX: 0000000000000000 RSI: 0000000000000001 RDI: ffff880123c87e50 [ 1145.961975] RBP: 1ffff10024790fc6 R08: 0000000000000000 R09: 0000000000000000 [ 1145.961979] R10: 0000000000000000 R11: 0000000000000000 R12: 00000000c000003e [ 1145.961982] R13: 0000000000000000 R14: ffff880123c87fd0 R15: 0000000000000080 [ 1145.961986] FS: 00007fdc27180700(0000) GS:ffff8801dba00000(0000) knlGS:0000000000000000 [ 1145.961989] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1145.961992] CR2: 000000c4a0f57010 CR3: 00000001d6ae2004 CR4: 00000000001606b0 [ 1145.961994] Call Trace: [ 1145.961996] syscall_trace_enter+0x506/0xc10 [ 1145.961999] ? syscall_slow_exit_work+0x560/0x560 [ 1145.962001] ? do_syscall_64+0x43/0x4b0 [ 1145.962004] do_syscall_64+0x331/0x4b0 [ 1145.962006] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1145.962008] RIP: 0033:0x4572d9 [ 1145.962011] RSP: 002b:00007fdc2717fcf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 1145.962017] RAX: ffffffffffffffda RBX: 00000000009300a8 RCX: 00000000004572d9 [ 1145.962020] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00000000009300a8 [ 1145.962023] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 1145.962027] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000009300ac [ 1145.962030] R13: 00007ffc7359aaaf R14: 00007fdc271809c0 R15: 0000000000000000 [ 1145.962032] Code: 9c f1 ff ff e8 2c fc 20 00 e9 36 f2 ff ff e8 32 fc 20 00 e9 5c ec ff ff e8 28 fc 20 00 e9 a7 f1 ff ff 0f 1f 00 41 55 41 54 55 53 <48> 89 fb 65 48 8b 2c 25 c0 de 01 00 e8 29 00 ff ff 48 8d bd 20 [ 1146.198209] Kernel panic - not syncing: hung_task: blocked tasks [ 1146.204414] CPU: 0 PID: 23 Comm: khungtaskd Not tainted 4.14.69+ #5 [ 1146.210808] Call Trace: [ 1146.213393] dump_stack+0xb9/0x11b [ 1146.216928] panic+0x1bf/0x3a4 [ 1146.220115] ? add_taint.cold.4+0x16/0x16 [ 1146.224278] watchdog+0x585/0xa70 [ 1146.227731] ? reset_hung_task_detector+0x10/0x10 [ 1146.232567] kthread+0x348/0x420 [ 1146.235927] ? kthread_create_on_node+0xe0/0xe0 [ 1146.240595] ret_from_fork+0x3a/0x50 [ 1146.244610] Dumping ftrace buffer: [ 1146.248201] (ftrace buffer empty) [ 1146.251893] Kernel Offset: 0x1b400000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff) [ 1146.262788] Rebooting in 86400 seconds..