000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f0000000600)) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x8) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:11:56 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:11:56 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0xd) 04:11:56 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) memfd_create(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 04:11:56 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x10) 04:11:56 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f0000000600)) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x4087) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:11:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg(r0, &(0x7f0000000680)={&(0x7f0000000200)=@in={0x2, 0x4e21, @broadcast}, 0x80, 0x0}, 0x0) 04:11:57 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:11:57 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:11:57 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x12) 04:12:00 executing program 4: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r2, 0x0) 04:12:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet6_tcp_int(r1, 0x6, 0x0, &(0x7f0000000000), 0x4) ptrace$setopts(0x4206, r3, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x200000000042800) 04:12:00 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f0000000600)) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x40000) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:12:00 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x15) 04:12:00 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:12:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = memfd_create(&(0x7f0000000380)='y\xb6;\xb2(\x98\x9a\xbd\xbc\'\x94<\x93.\xbc$\x1f[\xeea\xbaY\xc4\xc4#\xf6%R\xf4\x83\xd9N\xc5$]\x13\f\x85\x87 \xf2mi\xeaK>\x03M\xd2\x004yZ\xca5k-\xc6\xcd\x01\xb5O;_\xe8\a\xf7aW8n\x1d\xaf\xf63\xa8_\x7f\xed\xb6*)^6\xed\x06\xfbF|\x98\xeaa\xb6\xaf\xf3\xa3!Y\xa72cN4\xd2\x15m\x1a\xd4\xa0\xb17\xabQ\x12\xd7\xb5\x0f\xaf\x14\xac\xac;\xb8\xaa,\x01WCD\xbd\xbf\x06;\xe4\x9d\xea\xe7PV\x81\xb8=\xb7\t\xe4\x06\t\x00\x00\x00\x00\x00\x00\x00y\x8eF\x90\xa3g*\xcd\x04\xb4\x85\xdaN\x00'/182, 0x5) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x80000004d011, r2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) 04:12:00 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x18) 04:12:00 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f0000000600)) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0xfeffff) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:12:00 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:12:00 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) 04:12:00 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x28) 04:12:00 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:12:03 executing program 4: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r2, 0x0) 04:12:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") get_robust_list(0x0, &(0x7f00000004c0)=0x0, &(0x7f0000000500)) 04:12:03 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0xe0) 04:12:03 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='lo\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendmmsg(r0, &(0x7f0000002ec0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000b00)=[{0x10, 0x29}], 0x10}}], 0x1, 0x10) 04:12:03 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f0000000600)) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x1000000) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:12:03 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:12:03 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0xf0) 04:12:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x101000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r2, &(0x7f0000000100)=ANY=[@ANYBLOB='7:2\t'], 0x4) 04:12:03 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:12:03 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, 0x0) r1 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000004540)=[{{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000003500)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/tcp6\x00') preadv(r2, &(0x7f00000017c0), 0x1fe, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) prctl$PR_SET_MM(0x23, 0x0, &(0x7f0000ffd000/0x1000)=nil) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) accept$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', 0x0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) epoll_pwait(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TIOCVHANGUP(0xffffffffffffffff, 0x5437, 0x0) ioctl$BLKREPORTZONE(0xffffffffffffffff, 0xc0101282, 0x0) statx(r1, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) 04:12:03 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x1e2) 04:12:03 executing program 1: set_mempolicy(0x4003, &(0x7f0000000180)=0x6, 0x9) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = syz_open_dev$dmmidi(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(0xffffffffffffffff, 0x28, 0x2, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x4d7b, 0x800000000105082) r2 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f00000003c0)) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, &(0x7f00000ddff8), 0x10200000e) 04:12:06 executing program 4: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r2, 0x0) 04:12:06 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f0000000600)) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x8000000) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:12:06 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x300) 04:12:06 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:12:06 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendmmsg(r0, &(0x7f0000006a80)=[{{&(0x7f00000000c0)=@in={0x2, 0x4e23, @multicast1}, 0x80, &(0x7f0000002580)=[{&(0x7f0000001280)="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", 0x5c5}], 0x1}}], 0x1, 0x0) 04:12:06 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}, @broadcast}, @gre={{0x0, 0x0, 0x1, 0x0, 0xb, 0x0, 0x0, 0x8}, {}, {}, {0x0, 0x57}}}}}}, 0x0) 04:12:06 executing program 3: syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x2) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x200000000012, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000080)={0x0, 0x1a, "16497c8d8a2111291410f2427a77ccb5f1ee28d7541188c515f7"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) readv(r0, &(0x7f0000395000)=[{&(0x7f00004d2000)=""/4096, 0x1000}], 0x1) 04:12:06 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:12:06 executing program 1 (fault-call:9 fault-nth:0): r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) memfd_create(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 04:12:06 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x480) 04:12:06 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f0000000600)) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x87400000) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:12:06 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x500) 04:12:06 executing program 4: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r2, 0x0) 04:12:06 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:12:06 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x600) 04:12:06 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:12:06 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f0000000600)) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0xf5ffffff) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:12:06 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) memfd_create(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) [ 2792.297180] syz-executor.5 invoked oom-killer: gfp_mask=0x6000c0(GFP_KERNEL), nodemask=(null), order=0, oom_score_adj=1000 [ 2792.326095] syz-executor.5 cpuset=syz5 mems_allowed=0-1 [ 2792.351021] CPU: 1 PID: 13666 Comm: syz-executor.5 Not tainted 4.19.37 #5 [ 2792.358004] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2792.367372] Call Trace: [ 2792.369992] dump_stack+0x172/0x1f0 [ 2792.373649] dump_header+0x15e/0x929 [ 2792.377387] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2792.382516] ? ___ratelimit+0x60/0x595 [ 2792.386427] ? do_raw_spin_unlock+0x57/0x270 [ 2792.391558] oom_kill_process.cold+0x10/0x6f5 [ 2792.396087] ? task_will_free_mem+0x139/0x6e0 [ 2792.400706] out_of_memory+0x936/0x12d0 [ 2792.404704] ? lock_downgrade+0x810/0x810 [ 2792.408881] ? oom_killer_disable+0x280/0x280 [ 2792.413397] ? find_held_lock+0x35/0x130 [ 2792.417485] mem_cgroup_out_of_memory+0x1d2/0x240 [ 2792.422357] ? memcg_event_wake+0x230/0x230 [ 2792.426704] ? do_raw_spin_unlock+0x57/0x270 [ 2792.431164] ? _raw_spin_unlock+0x2d/0x50 [ 2792.435461] try_charge+0x1028/0x15b0 [ 2792.439287] ? find_held_lock+0x35/0x130 [ 2792.443387] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2792.448256] ? kasan_check_read+0x11/0x20 [ 2792.452433] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 2792.457302] mem_cgroup_try_charge+0x24d/0x5e0 [ 2792.461925] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 2792.466877] wp_page_copy+0x430/0x16a0 [ 2792.470799] ? follow_pfn+0x2a0/0x2a0 [ 2792.474624] ? kasan_check_read+0x11/0x20 [ 2792.478797] ? do_raw_spin_unlock+0x57/0x270 [ 2792.483228] do_wp_page+0x57d/0x10b0 [ 2792.486966] ? lock_acquire+0x16f/0x3f0 [ 2792.490966] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 2792.495728] ? kasan_check_write+0x14/0x20 [ 2792.500429] ? do_raw_spin_lock+0xc8/0x240 [ 2792.505124] __handle_mm_fault+0x230a/0x3f80 [ 2792.510470] ? vmf_insert_mixed_mkwrite+0x90/0x90 [ 2792.515357] ? find_held_lock+0x35/0x130 [ 2792.522108] ? handle_mm_fault+0x322/0xb30 [ 2792.527270] ? kasan_check_read+0x11/0x20 [ 2792.531561] handle_mm_fault+0x43f/0xb30 [ 2792.536880] __do_page_fault+0x62a/0xe90 [ 2792.540976] ? vmalloc_fault+0x770/0x770 [ 2792.545061] ? trace_hardirqs_off_caller+0x65/0x220 [ 2792.550097] ? trace_hardirqs_on_caller+0x6a/0x220 [ 2792.555048] ? page_fault+0x8/0x30 [ 2792.558618] do_page_fault+0x71/0x581 [ 2792.562443] ? page_fault+0x8/0x30 [ 2792.566030] page_fault+0x1e/0x30 [ 2792.569492] RIP: 0033:0x40e018 [ 2792.572701] Code: 8b 34 c6 4a 8d 04 2e 48 3d ff ff ff 7e 0f 86 77 ff ff ff bf ac e3 4b 00 31 c0 e8 03 39 ff ff 31 ff e8 4c 35 ff ff 0f 1f 40 00 <89> 3c b5 00 00 73 00 eb b6 31 ed 0f 1f 44 00 00 80 3d 4e 24 64 00 [ 2792.591625] RSP: 002b:00007fff6d936f10 EFLAGS: 00010246 [ 2792.597014] RAX: 0000000081707a99 RBX: 00000000eb14f73d RCX: 0000001b2e120000 [ 2792.604300] RDX: 0000000000000000 RSI: 0000000000001a99 RDI: ffffffff81707a99 [ 2792.611599] RBP: 0000000000000000 R08: 0000000081707a99 R09: 0000000081707a9d [ 2792.618910] R10: 00007fff6d9370b0 R11: 0000000000000246 R12: 000000000073bf88 [ 2792.626202] R13: 0000000080000000 R14: 00007efc60499008 R15: 0000000000000000 [ 2792.633512] ? trace_hardirqs_off_caller+0x19/0x220 [ 2792.640211] Task in /syz5 killed as a result of limit of /syz5 [ 2792.646627] memory: usage 307200kB, limit 307200kB, failcnt 138 [ 2792.653285] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2792.674501] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 04:12:07 executing program 3: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f0000000600)) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x87400000) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:12:07 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x700) 04:12:07 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 2792.685487] Memory cgroup stats for /syz5: cache:80KB rss:223500KB rss_huge:186368KB shmem:0KB mapped_file:132KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:223616KB inactive_file:0KB active_file:4KB unevictable:0KB [ 2792.712928] Memory cgroup out of memory: Kill process 5245 (syz-executor.5) score 1113 or sacrifice child [ 2792.746716] Killed process 5245 (syz-executor.5) total-vm:72848kB, anon-rss:2224kB, file-rss:35816kB, shmem-rss:0kB 04:12:07 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:12:07 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0xc00) 04:12:07 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f0000000600)) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0xfffffe00) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) [ 2793.149143] syz-executor.5 invoked oom-killer: gfp_mask=0x6000c0(GFP_KERNEL), nodemask=(null), order=0, oom_score_adj=1000 [ 2793.164181] syz-executor.5 cpuset=syz5 mems_allowed=0-1 [ 2793.169954] CPU: 1 PID: 13695 Comm: syz-executor.5 Not tainted 4.19.37 #5 [ 2793.176893] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2793.186234] Call Trace: [ 2793.188817] dump_stack+0x172/0x1f0 [ 2793.192453] dump_header+0x15e/0x929 [ 2793.196183] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2793.201317] ? ___ratelimit+0x60/0x595 [ 2793.205211] ? do_raw_spin_unlock+0x57/0x270 [ 2793.209630] oom_kill_process.cold+0x10/0x6f5 [ 2793.214136] ? task_will_free_mem+0x139/0x6e0 [ 2793.218645] out_of_memory+0x936/0x12d0 [ 2793.222630] ? lock_downgrade+0x810/0x810 [ 2793.226784] ? oom_killer_disable+0x280/0x280 [ 2793.231279] ? find_held_lock+0x35/0x130 [ 2793.235374] mem_cgroup_out_of_memory+0x1d2/0x240 [ 2793.240219] ? memcg_event_wake+0x230/0x230 [ 2793.244546] ? do_raw_spin_unlock+0x57/0x270 [ 2793.248970] ? _raw_spin_unlock+0x2d/0x50 [ 2793.253117] try_charge+0x1028/0x15b0 [ 2793.256918] ? find_held_lock+0x35/0x130 [ 2793.261002] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2793.265849] ? kasan_check_read+0x11/0x20 [ 2793.269992] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 2793.274835] mem_cgroup_try_charge+0x24d/0x5e0 [ 2793.279428] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 2793.284551] wp_page_copy+0x430/0x16a0 [ 2793.288453] ? follow_pfn+0x2a0/0x2a0 [ 2793.292249] ? kasan_check_read+0x11/0x20 [ 2793.296401] ? do_raw_spin_unlock+0x57/0x270 [ 2793.300828] do_wp_page+0x57d/0x10b0 [ 2793.304563] ? lock_acquire+0x16f/0x3f0 [ 2793.308551] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 2793.313218] ? kasan_check_write+0x14/0x20 [ 2793.317446] ? do_raw_spin_lock+0xc8/0x240 [ 2793.321691] __handle_mm_fault+0x230a/0x3f80 [ 2793.326110] ? vmf_insert_mixed_mkwrite+0x90/0x90 [ 2793.330952] ? find_held_lock+0x35/0x130 [ 2793.335003] ? handle_mm_fault+0x322/0xb30 [ 2793.339252] ? kasan_check_read+0x11/0x20 [ 2793.343419] handle_mm_fault+0x43f/0xb30 [ 2793.347491] __do_page_fault+0x62a/0xe90 [ 2793.351569] ? vmalloc_fault+0x770/0x770 [ 2793.355655] ? trace_hardirqs_off_caller+0x65/0x220 [ 2793.360675] ? trace_hardirqs_on_caller+0x6a/0x220 [ 2793.365642] ? page_fault+0x8/0x30 [ 2793.370993] do_page_fault+0x71/0x581 [ 2793.374806] ? page_fault+0x8/0x30 [ 2793.378340] page_fault+0x1e/0x30 [ 2793.381790] RIP: 0033:0x40e018 [ 2793.384996] Code: 8b 34 c6 4a 8d 04 2e 48 3d ff ff ff 7e 0f 86 77 ff ff ff bf ac e3 4b 00 31 c0 e8 03 39 ff ff 31 ff e8 4c 35 ff ff 0f 1f 40 00 <89> 3c b5 00 00 73 00 eb b6 31 ed 0f 1f 44 00 00 80 3d 4e 24 64 00 [ 2793.403917] RSP: 002b:00007fff6d936f10 EFLAGS: 00010246 [ 2793.409683] RAX: 00000000be32413d RBX: 000000001b70030f RCX: 0000001b2e120000 [ 2793.416951] RDX: 0000000000000000 RSI: 000000000000013d RDI: ffffffffbe32413d [ 2793.424231] RBP: 0000000000000007 R08: 00000000be32413d R09: 00000000be324141 [ 2793.431534] R10: 00007fff6d9370b0 R11: 0000000000000246 R12: 000000000073bf88 [ 2793.438809] R13: 0000000080000000 R14: 00007efc60499008 R15: 0000000000000007 [ 2793.448461] Task in /syz5 killed as a result of limit of /syz5 [ 2793.454688] memory: usage 307200kB, limit 307200kB, failcnt 170 [ 2793.461137] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2793.468478] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2793.474666] Memory cgroup stats for /syz5: cache:80KB rss:223524KB rss_huge:186368KB shmem:0KB mapped_file:132KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:223592KB inactive_file:0KB active_file:0KB unevictable:0KB [ 2793.495846] Memory cgroup out of memory: Kill process 7132 (syz-executor.5) score 1113 or sacrifice child [ 2793.505707] Killed process 7132 (syz-executor.5) total-vm:72848kB, anon-rss:2224kB, file-rss:35816kB, shmem-rss:0kB [ 2793.519125] oom_reaper: reaped process 7132 (syz-executor.5), now anon-rss:0kB, file-rss:34856kB, shmem-rss:0kB 04:12:09 executing program 4: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r2, 0x0) 04:12:09 executing program 3: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f0000000600)) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0xf5ffffff) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:12:09 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:12:09 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0xd00) 04:12:09 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f0000000600)) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0xfffffff5) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:12:10 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) tkill(r1, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) memfd_create(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 04:12:10 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f0000000600)) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x4087ffffffff) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:12:10 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0xf28) 04:12:10 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:12:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000140)="0c10b5b598cd80ddc3e46962f5696200d9d9d0c441395bf91cc18fe9589b26e101151515c4427d822a2af3430fe6b369cf0000e4da7676f2168f4808eebce00000802000c4215136c4a2791d505a8fe9509b9b9b000000c1ea01f265dc5f00c36645363ef80f9966032c24a1a1460f569f00082640c401fef34d0f2af9646736676666430fefb3000000007250b14f6b6b86650f1714111d54111d00") prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x16) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x10b040, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000000080)={{0x3800000000000000, 0x3}, 'port0\x00', 0x20, 0x11800, 0x79, 0x1, 0x6, 0x1000, 0x3af, 0x0, 0x2, 0x62}) recvfrom$netrom(r1, &(0x7f0000000200)=""/204, 0xcc, 0x2022, &(0x7f0000000300)={{0x3, @default, 0x3}, [@default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @bcast, @bcast]}, 0x48) [ 2795.701720] syz-executor.5 invoked oom-killer: gfp_mask=0x7080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null), order=3, oom_score_adj=1000 [ 2795.742217] syz-executor.5 cpuset=syz5 mems_allowed=0-1 [ 2795.747924] CPU: 1 PID: 13725 Comm: syz-executor.5 Not tainted 4.19.37 #5 [ 2795.754867] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2795.764267] Call Trace: [ 2795.766909] dump_stack+0x172/0x1f0 [ 2795.770561] dump_header+0x15e/0x929 [ 2795.774317] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2795.779445] ? ___ratelimit+0x60/0x595 [ 2795.783356] ? do_raw_spin_unlock+0x57/0x270 [ 2795.787805] oom_kill_process.cold+0x10/0x6f5 [ 2795.792336] ? task_will_free_mem+0x139/0x6e0 [ 2795.796855] ? find_held_lock+0x35/0x130 [ 2795.800941] out_of_memory+0x936/0x12d0 [ 2795.804940] ? lock_downgrade+0x810/0x810 [ 2795.809141] ? oom_killer_disable+0x280/0x280 [ 2795.813654] ? find_held_lock+0x35/0x130 [ 2795.817774] mem_cgroup_out_of_memory+0x1d2/0x240 [ 2795.822645] ? memcg_event_wake+0x230/0x230 [ 2795.826993] ? do_raw_spin_unlock+0x57/0x270 [ 2795.831478] ? _raw_spin_unlock+0x2d/0x50 [ 2795.835652] try_charge+0x1028/0x15b0 [ 2795.839472] ? find_held_lock+0x35/0x130 [ 2795.843561] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2795.848426] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 2795.853289] ? find_held_lock+0x35/0x130 [ 2795.857381] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 2795.862257] memcg_kmem_charge_memcg+0x7c/0x130 [ 2795.866949] ? memcg_kmem_put_cache+0xb0/0xb0 [ 2795.871476] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 2795.876450] memcg_kmem_charge+0x136/0x300 [ 2795.880712] __alloc_pages_nodemask+0x3c6/0x760 [ 2795.885403] ? __alloc_pages_slowpath+0x2870/0x2870 [ 2795.890446] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2795.895056] ? trace_hardirqs_on+0x67/0x230 [ 2795.899395] ? kasan_check_read+0x11/0x20 [ 2795.903571] copy_process.part.0+0x3e0/0x7970 [ 2795.908113] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2795.913236] ? delayacct_end+0x5c/0x100 [ 2795.917267] ? __delayacct_freepages_end+0xe0/0x140 [ 2795.922322] ? __lock_acquire+0x6eb/0x48f0 [ 2795.926597] ? __cleanup_sighand+0x70/0x70 [ 2795.930882] ? mark_held_locks+0x100/0x100 [ 2795.935157] _do_fork+0x257/0xfe0 [ 2795.938640] ? fork_idle+0x1d0/0x1d0 [ 2795.942510] ? blkcg_print_stat+0xb90/0xb90 [ 2795.946857] ? kasan_check_read+0x11/0x20 [ 2795.951026] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2795.955810] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2795.960584] ? do_syscall_64+0x26/0x610 [ 2795.964601] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2795.969983] ? do_syscall_64+0x26/0x610 [ 2795.973984] __x64_sys_clone+0xbf/0x150 [ 2795.977985] do_syscall_64+0x103/0x610 [ 2795.981907] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2795.987155] RIP: 0033:0x45b779 [ 2795.990365] Code: ff 48 85 f6 0f 84 d7 8e fb ff 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 0f 8c ae 8e fb ff 74 01 c3 31 ed 48 f7 c7 00 00 01 00 75 [ 2796.009291] RSP: 002b:00007fff6d936ea8 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 2796.017042] RAX: ffffffffffffffda RBX: 00007efc5e498700 RCX: 000000000045b779 [ 2796.024349] RDX: 00007efc5e4989d0 RSI: 00007efc5e497db0 RDI: 00000000003d0f00 [ 2796.031636] RBP: 00007fff6d9370c0 R08: 00007efc5e498700 R09: 00007efc5e498700 04:12:10 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 2796.038954] R10: 00007efc5e4989d0 R11: 0000000000000202 R12: 0000000000000000 [ 2796.046236] R13: 00007fff6d936f5f R14: 00007efc5e4989c0 R15: 000000000073bf0c 04:12:10 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x1200) [ 2796.182858] Task in /syz5 killed as a result of limit of /syz5 [ 2796.203259] memory: usage 307172kB, limit 307200kB, failcnt 197 [ 2796.217186] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2796.225623] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2796.238326] Memory cgroup stats for /syz5: cache:80KB rss:223568KB rss_huge:186368KB shmem:0KB mapped_file:132KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:223544KB inactive_file:12KB active_file:0KB unevictable:0KB [ 2796.268307] Memory cgroup out of memory: Kill process 28786 (syz-executor.5) score 1113 or sacrifice child [ 2796.286622] Killed process 28786 (syz-executor.5) total-vm:72848kB, anon-rss:2224kB, file-rss:35808kB, shmem-rss:0kB [ 2796.301681] oom_reaper: reaped process 28786 (syz-executor.5), now anon-rss:0kB, file-rss:34848kB, shmem-rss:0kB 04:12:12 executing program 4: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, 0xffffffffffffffff, 0x0) 04:12:12 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x10) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x0) openat$uhid(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$alg(0x26, 0x5, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) getsockopt$TIPC_CONN_TIMEOUT(0xffffffffffffffff, 0x10f, 0x82, &(0x7f0000000140), &(0x7f0000000300)=0x4) ioctl$VIDIOC_S_AUDIO(0xffffffffffffffff, 0x40345622, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbbf4, 0x0, 0xd}, 0xc, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c0000002200010000000000000000000400000008001cc5908d3ace8855e73fe001880c6111009ca50000"], 0x1c}}, 0x0) 04:12:12 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:12:12 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x1500) 04:12:12 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f0000000600)) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x1000000000000) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) [ 2798.640842] syz-executor.5 invoked oom-killer: gfp_mask=0x7080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null), order=3, oom_score_adj=1000 [ 2798.698534] syz-executor.5 cpuset=syz5 mems_allowed=0-1 [ 2798.703986] CPU: 1 PID: 13753 Comm: syz-executor.5 Not tainted 4.19.37 #5 [ 2798.710925] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2798.720290] Call Trace: [ 2798.722907] dump_stack+0x172/0x1f0 [ 2798.726556] dump_header+0x15e/0x929 [ 2798.730292] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2798.735431] ? ___ratelimit+0x60/0x595 [ 2798.739340] ? do_raw_spin_unlock+0x57/0x270 [ 2798.739364] oom_kill_process.cold+0x10/0x6f5 [ 2798.739385] ? task_will_free_mem+0x139/0x6e0 [ 2798.748298] ? find_held_lock+0x35/0x130 [ 2798.756867] out_of_memory+0x936/0x12d0 [ 2798.760871] ? lock_downgrade+0x810/0x810 [ 2798.765044] ? oom_killer_disable+0x280/0x280 [ 2798.769555] ? find_held_lock+0x35/0x130 [ 2798.769585] mem_cgroup_out_of_memory+0x1d2/0x240 [ 2798.769601] ? memcg_event_wake+0x230/0x230 [ 2798.769621] ? do_raw_spin_unlock+0x57/0x270 [ 2798.769639] ? _raw_spin_unlock+0x2d/0x50 [ 2798.769659] try_charge+0x1028/0x15b0 [ 2798.769673] ? find_held_lock+0x35/0x130 [ 2798.769698] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2798.769725] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 2798.787372] ? find_held_lock+0x35/0x130 [ 2798.787392] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 2798.787422] memcg_kmem_charge_memcg+0x7c/0x130 [ 2798.787452] ? memcg_kmem_put_cache+0xb0/0xb0 [ 2798.822724] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 2798.822749] memcg_kmem_charge+0x136/0x300 [ 2798.822769] __alloc_pages_nodemask+0x3c6/0x760 [ 2798.822793] ? __alloc_pages_slowpath+0x2870/0x2870 [ 2798.846060] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2798.846081] ? trace_hardirqs_on+0x67/0x230 [ 2798.846095] ? kasan_check_read+0x11/0x20 [ 2798.846118] copy_process.part.0+0x3e0/0x7970 [ 2798.846138] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2798.846154] ? delayacct_end+0x5c/0x100 [ 2798.846174] ? __delayacct_freepages_end+0xe0/0x140 [ 2798.846194] ? __lock_acquire+0x6eb/0x48f0 [ 2798.846219] ? __cleanup_sighand+0x70/0x70 [ 2798.886368] ? mark_held_locks+0x100/0x100 [ 2798.886402] _do_fork+0x257/0xfe0 [ 2798.886423] ? fork_idle+0x1d0/0x1d0 [ 2798.886460] ? blkcg_print_stat+0xb90/0xb90 [ 2798.902270] ? kasan_check_read+0x11/0x20 [ 2798.906447] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2798.911221] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2798.915997] ? do_syscall_64+0x26/0x610 [ 2798.916024] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2798.925358] ? do_syscall_64+0x26/0x610 [ 2798.925381] __x64_sys_clone+0xbf/0x150 [ 2798.925402] do_syscall_64+0x103/0x610 [ 2798.925425] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2798.925437] RIP: 0033:0x45b779 [ 2798.925456] Code: ff 48 85 f6 0f 84 d7 8e fb ff 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 0f 8c ae 8e fb ff 74 01 c3 31 ed 48 f7 c7 00 00 01 00 75 [ 2798.942475] RSP: 002b:00007fff6d936ea8 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 2798.942493] RAX: ffffffffffffffda RBX: 00007efc5e498700 RCX: 000000000045b779 [ 2798.942503] RDX: 00007efc5e4989d0 RSI: 00007efc5e497db0 RDI: 00000000003d0f00 [ 2798.942513] RBP: 00007fff6d9370c0 R08: 00007efc5e498700 R09: 00007efc5e498700 [ 2798.942522] R10: 00007efc5e4989d0 R11: 0000000000000202 R12: 0000000000000000 [ 2798.942530] R13: 00007fff6d936f5f R14: 00007efc5e4989c0 R15: 000000000073bf0c [ 2798.944451] Task in [ 2798.966366] /syz5 [ 2798.992629] killed as a result of limit of /syz5 [ 2799.026539] memory: usage 307180kB, limit 307200kB, failcnt 243 [ 2799.032899] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2799.049953] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2799.070716] Memory cgroup stats for /syz5: cache:80KB rss:223404KB rss_huge:186368KB shmem:0KB mapped_file:132KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:223516KB inactive_file:0KB active_file:0KB unevictable:0KB [ 2799.100348] Memory cgroup out of memory: Kill process 10697 (syz-executor.5) score 1113 or sacrifice child [ 2799.110666] Killed process 10697 (syz-executor.5) total-vm:72848kB, anon-rss:2224kB, file-rss:35804kB, shmem-rss:0kB [ 2799.125699] oom_reaper: reaped process 10697 (syz-executor.5), now anon-rss:0kB, file-rss:34844kB, shmem-rss:0kB 04:12:13 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, r0, 0x0, 0x11, &(0x7f0000000000)='security.selinux\x00', 0xffffffffffffffff}, 0x30) syz_open_procfs(r1, &(0x7f00000001c0)='mountinfo\x00') r3 = creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) getresuid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)=0x0) stat(&(0x7f0000000340)='./file2\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_netfilter(r3, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000400)={&(0x7f0000000a00)={0x14a8, 0x1, 0x7, 0x70a, 0x70bd2c, 0x25dfdbff, {0x3, 0x0, 0x8}, [@typed={0x10, 0x6, @str='threaded\x00'}, @nested={0x114, 0x5, [@typed={0x4, 0x86}, @generic="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", @generic="5e7ff8f35d48", @typed={0x8, 0xf, @fd=r2}]}, @generic="b06542762d264392cd302c3d5be38cb0464566de7bf2a008056ec98cd6ebf89be906d78f0348c07cb4383acf9577271546b092101a6e06465446979d9f91b70b8a5a2f6baeeb37d26730a1cf5153d67aa15ade1a4225f691796a6cbe2be2f137a394f5058e14a4ad498f03b0c87725ab0759f95f8b662c4a79b7e38b398d9405a340217c14d318c609eae91c3fae580bbe79231c4a246aaf784751d00c6d2ebb09c9399b4303ca30761579b2b9e2610a2997d3e8eda30be71124634d6f3cdc32ca62ff12e848830c0a7edf91688e13d163377d56a56e4248e4f2f03f14ae0654aa56a77afe1ab82df446fb3bf59e63", @nested={0x88, 0x89, [@typed={0x8, 0x30, @str='\x00'}, @generic="48ec81cdaa56afd3a30255cfc4e1ae132fcbff6d4f805d9f5b6125555af7ed923244cdbcdd7bda49eceb7186dba643d068429f205836c9fb9739d5e46d4c0c4fecb04d30437d0cf8f4aa8e4eede735c82dae0b022120aa6e8e5f076a4b2e1319ddb89ddd3a2fa77b4cb2e71e", @typed={0x8, 0xd, @fd=r3}, @typed={0x8, 0x6, @u32=0x8}]}, @nested={0x188, 0x36, [@typed={0x8, 0x24, @ipv4=@multicast1}, @generic="77cb3fcce474b5c3aebe82d7d59c8872dae424da1678887ab0768b7c7b9591a6623d0e25ffbb45408ca6ca6a1d83ec19eccd031ef298b0632ed242410a2eee09fb901191a50028a3163cc3e756678512b2f560aa7fbba9dbbb1c137cf1c830d2349a30c889700fcaec04d93de8cb4733d867c6ab7c82ea03871f3310b314d40cd3d8625d284bc81b4f68662576ea8c0010026b1e2d2012fe805c9fedc9f19ae204c3c85ca0e73116f9fb2626a4df96128a12f6bb657220f4e24e6f22d0d2e0bb186206899197b36766114c0952a872509cdca6b3a3957924357f0b4ffba89b889a697ba34c3f7d9398e9508c90bfa770dfb2234c", @generic="6e6dc847d91d823e60cb1b7af5c31fca8493c96ac847ac0bd15fe48a6aafd6ac5958a4c311eb7949d201de94ed523c2390d4aad516e2a7df0a5d46c847b294c1e880ad22df3d3549f504d6ea43cc4ba36fdc51ee8c6675dd66504d601efed4bb316d50d706eb2098fb282ca7198ce1c6d272", @typed={0x14, 0x53, @ipv6=@mcast1}]}, @nested={0x1070, 0x4b, [@typed={0x14, 0x2, @str='mime_type\\)+\x00'}, @generic="1781470b3e60bc9195e32753f3ff7ef267d0b569265a35ffc75ccb99d2b1015b1bbb7fd2fe788810c9d0c78650c5f2", @typed={0x8, 0x90, @uid=r5}, @typed={0x8, 0x68, @uid=r6}, @typed={0xc, 0x4f, @u64=0x4}, @typed={0x8, 0x14, @ipv4=@loopback}, @typed={0x1004, 0x42, @binary="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"}]}]}, 0x14a8}, 0x1, 0x0, 0x0, 0x24048810}, 0x10) ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) memfd_create(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 04:12:13 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x1800) 04:12:13 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:12:13 executing program 4: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, 0xffffffffffffffff, 0x0) 04:12:13 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f0000000600)) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x4000000000000) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:12:13 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x1f00) 04:12:13 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:12:13 executing program 3: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f0000000600)) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x1000000000000) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) [ 2799.427853] syz-executor.5 invoked oom-killer: gfp_mask=0x7080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null), order=0, oom_score_adj=1000 [ 2799.494328] syz-executor.5 cpuset=syz5 mems_allowed=0-1 [ 2799.499852] CPU: 1 PID: 13776 Comm: syz-executor.5 Not tainted 4.19.37 #5 [ 2799.506791] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2799.516651] Call Trace: [ 2799.519257] dump_stack+0x172/0x1f0 [ 2799.522912] dump_header+0x15e/0x929 [ 2799.526641] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2799.531762] ? ___ratelimit+0x60/0x595 [ 2799.535676] ? do_raw_spin_unlock+0x57/0x270 [ 2799.540112] oom_kill_process.cold+0x10/0x6f5 [ 2799.544634] ? task_will_free_mem+0x139/0x6e0 [ 2799.549148] ? find_held_lock+0x35/0x130 [ 2799.553237] out_of_memory+0x936/0x12d0 [ 2799.557239] ? lock_downgrade+0x810/0x810 [ 2799.561413] ? oom_killer_disable+0x280/0x280 [ 2799.565927] ? find_held_lock+0x35/0x130 [ 2799.570017] mem_cgroup_out_of_memory+0x1d2/0x240 [ 2799.574878] ? memcg_event_wake+0x230/0x230 [ 2799.579225] ? do_raw_spin_unlock+0x57/0x270 [ 2799.583658] ? _raw_spin_unlock+0x2d/0x50 [ 2799.587849] try_charge+0x1028/0x15b0 [ 2799.591679] ? find_held_lock+0x35/0x130 [ 2799.595769] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2799.600641] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 2799.605506] ? find_held_lock+0x35/0x130 [ 2799.609585] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 2799.614455] memcg_kmem_charge_memcg+0x7c/0x130 [ 2799.619139] ? memcg_kmem_put_cache+0xb0/0xb0 [ 2799.623657] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 2799.628526] memcg_kmem_charge+0x136/0x300 [ 2799.632782] __alloc_pages_nodemask+0x3c6/0x760 [ 2799.637483] ? free_transhuge_page+0x230/0x310 [ 2799.642087] ? __alloc_pages_slowpath+0x2870/0x2870 [ 2799.647129] ? __put_compound_page+0x96/0xe0 [ 2799.651567] ? put_page+0xe7/0x130 [ 2799.655130] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2799.660782] alloc_pages_current+0x107/0x210 [ 2799.665227] pte_alloc_one+0x1b/0x1a0 [ 2799.669064] __pte_alloc+0x2a/0x360 [ 2799.672715] __handle_mm_fault+0x3416/0x3f80 [ 2799.677151] ? vmf_insert_mixed_mkwrite+0x90/0x90 [ 2799.682019] ? find_held_lock+0x35/0x130 [ 2799.686100] ? handle_mm_fault+0x322/0xb30 [ 2799.690367] ? kasan_check_read+0x11/0x20 [ 2799.694536] handle_mm_fault+0x43f/0xb30 [ 2799.698622] __do_page_fault+0x62a/0xe90 [ 2799.702714] ? vmalloc_fault+0x770/0x770 [ 2799.706792] ? trace_hardirqs_off_caller+0x65/0x220 [ 2799.711840] ? trace_hardirqs_on_caller+0x6a/0x220 [ 2799.716784] ? page_fault+0x8/0x30 [ 2799.720366] do_page_fault+0x71/0x581 [ 2799.724193] ? page_fault+0x8/0x30 [ 2799.727749] page_fault+0x1e/0x30 [ 2799.731218] RIP: 0033:0x4400d9 04:12:13 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') r1 = creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc04c5349, &(0x7f0000000180)={0x0, 0x3, 0x986}) r2 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) memfd_create(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 04:12:13 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x2000) 04:12:13 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x2800) 04:12:13 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x280f) 04:12:14 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x2880) [ 2799.734425] Code: b7 0e 66 89 0f 48 83 c6 02 48 83 c7 02 0f 1f 40 00 f6 c2 04 74 0c 8b 0e 89 0f 48 83 c6 04 48 83 c7 04 f6 c2 08 74 0e 48 8b 0e <48> 89 0f 48 83 c6 08 48 83 c7 08 81 e2 f0 00 00 00 74 1f 0f 1f 40 [ 2799.753345] RSP: 002b:00007fff6d936fd8 EFLAGS: 00010202 [ 2799.758731] RAX: 00000000200000c0 RBX: 0000000000740078 RCX: 0030656c69662f2e [ 2799.766022] RDX: 0000000000000008 RSI: 0000000000740098 RDI: 00000000200000c0 [ 2799.773318] RBP: fffffffffffffffe R08: 000000006bf79866 R09: 000000006bf7986a [ 2799.780609] R10: 00007fff6d9370b0 R11: 0000000000000246 R12: 0000000000740080 [ 2799.787903] R13: 00000000004beb51 R14: 0000000000000000 R15: 000000000073bf0c 04:12:14 executing program 3: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f0000000600)) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x1000000000000) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) [ 2799.810457] Task in /syz5 killed as a result of limit of /syz5 [ 2799.828144] memory: usage 307200kB, limit 307200kB, failcnt 275 [ 2799.841463] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 04:12:14 executing program 4: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, 0xffffffffffffffff, 0x0) 04:12:14 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 2799.874760] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2799.889271] Memory cgroup stats for /syz5: cache:80KB rss:223472KB rss_huge:186368KB shmem:0KB mapped_file:132KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:223528KB inactive_file:4KB active_file:0KB unevictable:0KB [ 2799.979171] Memory cgroup out of memory: Kill process 4875 (syz-executor.5) score 1113 or sacrifice child [ 2800.047111] Killed process 4875 (syz-executor.5) total-vm:72716kB, anon-rss:2216kB, file-rss:35808kB, shmem-rss:0kB [ 2800.085773] oom_reaper: reaped process 4875 (syz-executor.5), now anon-rss:0kB, file-rss:34848kB, shmem-rss:0kB [ 2800.115972] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. 04:12:14 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f0000000600)) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0xfeffff00000000) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:12:14 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x3f00) 04:12:14 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:12:14 executing program 3: socketpair(0x2, 0x5, 0x400, &(0x7f0000000000)={0xffffffffffffffff}) connect$nfc_llcp(r0, &(0x7f0000000040)={0x27, 0x0, 0x2, 0x7, 0x2, 0x8, "2496fba9f8f088dfda2fe5018c25fd79de81db3eaeb18332724f7dd97eff113f99b8553961ea5234e550ecf61d348877b9e4293def31ba5832ea531d93fa3c", 0x11}, 0x60) connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast1}, 0x1c) mbind(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x34b6, 0x5) [ 2800.394044] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 04:12:16 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$NBD_SET_SIZE(r0, 0xab02, 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000000)='./file0\x00') r1 = creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() lsetxattr$security_selinux(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0xb6, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) r3 = request_key(&(0x7f0000000080)='blacklist\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f0000000200)='}&\x00', 0xfffffffffffffff9) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000240)={r3, 0x8000, 0x7}, &(0x7f0000000280)={'enc=', 'pkcs1', ' hash=', {'sha224\x00'}}, &(0x7f0000000300)="1a8a611d2f72bf6dd55fe3d341e693e904926d07d4113f98a251c0c97ba1e416e2b75254bf3de88373a90143f182ca60", &(0x7f0000000340)="c0130864808c6e6aadeb934b415933888d521bf8a7d9292e3d225322f7a5abe3533bf26b95cecb0dbf1b4b2522bbef089026b03fddd4b5ac2df0e66843754f56be66a3150bfcfc2dfc29e538d3c53731a7958e69c9ae5759ccf55af252aeb8521541a2560fe95fa3cd64272e2b80d836e5385e674041bb7702f0abd08acd408a53efb9620eeda78721ed414a51d6ddfc92daba5c1481e3e63d82eaa4feb51b65349431b3646ca50538693af2213ea27c54bf798781f3a171") creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ZERO(r1, 0x0, 0x48f, &(0x7f0000000400)={0x7f, @rand_addr=0xbf, 0x80000001, 0x4, 'none\x00', 0x21, 0x6, 0x75}, 0x2c) memfd_create(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 04:12:16 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x4000) 04:12:16 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:12:16 executing program 3: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x440, 0x0) ioctl$PIO_SCRNMAP(r0, 0x4b41, &(0x7f0000000040)="03e2593ad15608b46238a12a16c48712a96a661f") mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x3f, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e24, 0xa8, @mcast1}}, 0x0, 0xfff, 0x9, 0x9, 0x10}, &(0x7f0000000780)=0x98) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000007c0)={r1, 0x2}, 0x8) ioctl$VT_DISALLOCATE(r0, 0x5608) ioctl$SNDRV_TIMER_IOCTL_STOP(r0, 0x54a1) write$binfmt_elf32(r0, &(0x7f0000000080)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x0, 0x0, 0x0, 0x9, 0x3, 0x3f, 0x200, 0x115, 0x38, 0x4f, 0x9, 0x6, 0x20, 0x2, 0x100, 0x0, 0x1}, [{0x60000004, 0x3f, 0x8, 0x1f, 0x3, 0x5, 0x0, 0x3ff}], "63119375b8ece3fac1df7137b0052e046f5428163df036c7701c1fe9cfd661c78c634eb0ad9a0536fd3a5eb8", [[], [], [], [], []]}, 0x584) 04:12:16 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f0000000600)) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x100000000000000) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:12:17 executing program 3: socketpair(0x22, 0x2, 0x11, &(0x7f0000000380)) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_VERSION(r0, 0xc0106407, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xfffffffffffffffc}) [ 2803.023566] delete_channel: no stack [ 2803.033454] delete_channel: no stack [ 2803.047573] delete_channel: no stack [ 2803.055381] delete_channel: no stack 04:12:17 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x8004) 04:12:17 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:12:17 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) lstat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = geteuid() syz_mount_image$hfsplus(&(0x7f00000000c0)='hfsplus\x00', &(0x7f0000000100)='./file0\x00', 0x9a8, 0x5, &(0x7f0000000600)=[{&(0x7f0000000140)="fc482526f824862381d18556f66b035d9a54d6a341c77cc27d5dbb48fdc98f747ff97979c5ab452d87821b115f3a53433f33b7b21a852fa602073028e59e5d646255e283318a04c00329bbc9fd76d1c80692f79402dde95dd842bbb0e662896076bed101953c0175612972584bba2896addc4f44cde2227df0e1649ca76083bed8cf25ed9c737502e16c3c70cde9da45597e788ea1b9d30ccb9f1310692502e48dfc397b0f7d93aeffaad0a25bb54204897a9b062fc0f341f52fcdbe0fe5fbc4a9f4a6879d", 0xc5, 0x6}, {&(0x7f0000000240)="8c6ece66e36db22b38deda2f296d8f9b07c53ffaab00a854ef1723dc87d9a1e3059d37a54b238d724c826c74f8f1b68c61ccf8e7c8189670e1e4c676db06f21d915a279d30d13b8c20a98698ef7837d141a907bf88b40aa80cc7d8aac7a307c4f94b9bb3853848b7636574dde96ee002140c3f8cf8d49d5dd7f15e7e0f630b5eea499ff25376c677709d438b7eedca5ddbdc76e1ed1bab85e709a23cc8b38c", 0x9f, 0x6}, {&(0x7f00000003c0)="d06b1f0f2c18f6a0a21185ced14b2e41f29cf0594325a68532d1c5c59e8d6adc9db7b1ff5109c20270c2b8b7153e57ecf3307a85b395ec3cd7c41697297138b512766b454404ca1e94a078bd7dcf68d72a49a035f7f07b53e7fb87768ae09578fd1fc1910f3bc87bc649b7fb7d8da51c0b889a42e782fee875ab628f6b09e1dbe8aaf6a2f917d54217d0a53a11e30f85a885c99fc9aa764dfefa36d6faa30c583fdf9176d8662ed226dc388fdfaae366512a3be5a6ee886d9e01c8693e9eef513a4589d22c9d48c850692a488d09dfbfe39f0d13d653ea0b698def3fa90ce272f9953ecc528db4b7a4", 0xe9, 0x3}, {&(0x7f00000004c0)="9dbf9bf6c1c45c0343c0c9de3a1035c3bfec4d64cc209a84fc8af3ef5d8095e1629616643db39b11b2014bd812107fe6f30c2220ff462dd6ae186f232900e34d5fce42b6c054327dcc6d3989801cd14e81f60e64e28cd8a7edbd269ff8a02f0ab7a8b26dbaa62d3c76df5aa1532aabb81cf82bc3b3e8d1e0", 0x78, 0xcdb}, {&(0x7f0000000540)="3794f0a705eb94329140d60b1eaaad426e4fb22212f9ded06473f8051a56f8278951f9c2a5e47286e83f9a5eab8bd846bce0bed9430c0edf329aa397b2e0dd08133b8419f971b24b06f5c31795928a081615cf5b1708a6c70864e99e98a52a5cacafb376e9ab560762eed82c6c3230217988cf44a098cb5ae826712479e2da7904422d93a7d4366b3c563f6d7705bd68228f", 0x92, 0x2}], 0x1000400, &(0x7f0000000740)={[{@uid={'uid', 0x3d, r2}}, {@nodecompose='nodecompose'}, {@creator={'creator', 0x3d, "8b412621"}}, {@session={'session', 0x3d, 0x3ff}}], [{@obj_type={'obj_type', 0x3d, '/dev/sg#\x00'}}, {@subj_type={'subj_type', 0x3d, 'wlan0[\\GPL'}}, {@appraise='appraise'}, {@fowner_eq={'fowner', 0x3d, r3}}, {@context={'context', 0x3d, 'user_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}]}) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x53, 0xffff7ffb9fffffff, 0x6, 0x0, @buffer={0x0, 0xf, &(0x7f0000000080)=""/15}, &(0x7f0000000040)="030000962a93", 0x0, 0x0, 0x0, 0x0, 0x0}) write$binfmt_elf64(r1, &(0x7f0000000300)=ANY=[], 0xf6) read(r1, &(0x7f0000000380)=""/42, 0xf0) 04:12:17 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f0000000600)) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x800000000000000) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:12:17 executing program 4: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f0000000600)) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x100000000000000) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:12:17 executing program 3 (fault-call:9 fault-nth:0): r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r2, 0x0) [ 2803.426495] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 04:12:17 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:12:17 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x8028) 04:12:17 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f0000000600)) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0xf5ffffff00000000) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:12:17 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') r1 = creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$VIDIOC_S_TUNER(r1, 0x4054561e, &(0x7f0000000240)={0xceb1, "be90943fcaa209438cbe05099a23fef40792e08995112420a89b0560f03a7b3b", 0x7, 0x4, 0xff, 0x2, 0x9, 0x4, 0x10001, 0x43}) r2 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file2\x00', 0x10000, 0x120) tkill(r2, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) memfd_create(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 04:12:17 executing program 4: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f0000000600)) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x800000000000000) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) [ 2803.736823] FAULT_INJECTION: forcing a failure. [ 2803.736823] name failslab, interval 1, probability 0, space 0, times 0 04:12:17 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0xe0ff) [ 2803.832774] CPU: 1 PID: 13908 Comm: syz-executor.3 Not tainted 4.19.37 #5 [ 2803.839757] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2803.849160] Call Trace: [ 2803.851769] dump_stack+0x172/0x1f0 [ 2803.855426] should_fail.cold+0xa/0x1b [ 2803.859343] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2803.864471] ? lock_downgrade+0x810/0x810 [ 2803.868651] ? ___might_sleep+0x163/0x280 [ 2803.872827] __should_failslab+0x121/0x190 [ 2803.877083] should_failslab+0x9/0x14 [ 2803.880900] kmem_cache_alloc+0x2b1/0x700 [ 2803.885064] ? lock_downgrade+0x810/0x810 [ 2803.889236] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2803.894792] ? check_preemption_disabled+0x48/0x290 [ 2803.899839] getname_flags+0xd6/0x5b0 [ 2803.903663] getname+0x1a/0x20 [ 2803.906873] do_sys_open+0x2c9/0x550 [ 2803.910604] ? filp_open+0x80/0x80 [ 2803.914163] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2803.918930] ? do_syscall_64+0x26/0x610 [ 2803.922940] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2803.928322] ? do_syscall_64+0x26/0x610 [ 2803.932325] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2803.936940] __x64_sys_creat+0x61/0x80 [ 2803.940853] do_syscall_64+0x103/0x610 [ 2803.944762] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2803.949971] RIP: 0033:0x458da9 [ 2803.953176] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2803.972096] RSP: 002b:00007f07a3330c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 04:12:18 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 2803.979838] RAX: ffffffffffffffda RBX: 00007f07a3330c90 RCX: 0000000000458da9 [ 2803.987135] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200000c0 [ 2803.994427] RBP: 000000000073c0e0 R08: 0000000000000000 R09: 0000000000000000 [ 2804.001714] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f07a33316d4 [ 2804.009012] R13: 00000000004bf304 R14: 00000000004d0488 R15: 0000000000000004 04:12:18 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f0000000600)) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0xffffffff87400000) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:12:18 executing program 4: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f0000000600)) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x800000000000000) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:12:18 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:12:18 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0xe201) [ 2804.327789] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 04:12:20 executing program 3 (fault-call:9 fault-nth:1): r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r2, 0x0) 04:12:20 executing program 4: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f0000000600)) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x800000000000000) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:12:20 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0xf000) 04:12:20 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 2806.894502] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 04:12:20 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0xff00) 04:12:20 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f0000000600)) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:12:20 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x39) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) memfd_create(0x0, 0x0) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000000)) write(0xffffffffffffffff, 0x0, 0x0) 04:12:20 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:12:20 executing program 4: ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x1000, 0x8, 0x7461b6a3, 0x973}) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x8d5af}], 0x1000000000000029, 0x0) 04:12:20 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r2, 0x0) [ 2807.089570] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 04:12:21 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0xff01) 04:12:21 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:12:21 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0xff0f) 04:12:21 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r3 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) close(r1) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r4, 0x8921, &(0x7f0000000600)) sendmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:12:21 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:12:21 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0xffe0) [ 2807.769469] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 04:12:21 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:12:21 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) write$selinux_access(r0, &(0x7f0000000640)={'system_u:object_r:chkpwd_exec_t:s0', 0x20, 'unconfined_u:system_r:insmod_t:s0-s0:c0.c1023', 0x20, 0x6}, 0x66) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000740)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) r4 = shmget$private(0x0, 0x2000, 0x54000c00, &(0x7f0000ffd000/0x2000)=nil) r5 = shmat(r4, &(0x7f0000ffb000/0x3000)=nil, 0x7000) shmdt(r5) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f0000000600)) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) r6 = msgget$private(0x0, 0x3a8) getsockopt$XDP_MMAP_OFFSETS(r3, 0x11b, 0x1, &(0x7f00000007c0), &(0x7f00000004c0)=0x60) msgrcv(r6, &(0x7f00000006c0)={0x0, ""/87}, 0x5f, 0x3, 0x1000) [ 2808.037933] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 04:12:23 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') r1 = creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = getpgrp(0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000000)=0x0) rt_tgsigqueueinfo(r2, r3, 0xa, &(0x7f0000000180)={0xe, 0x4988, 0x7}) r4 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x39) r5 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$VIDIOC_G_FBUF(r5, 0x8030560a, &(0x7f0000000300)={0x4, 0x2f, &(0x7f0000000240)="cae9711347e9f68bedfff51fd412d1d00af67ed5b7c6c27ebaa5c9727c4007dc24a2ca9f8e4ef5931e4b3d9a17c8e01e841e3ddb05a3c8ccb80a8cebbff1045f2efec3ba21fda30c43f35c5e862ac3d934f679734cd3085993a1d4d86df4c90c075fea1f7ddb5048c7d0c80d09ba2564991dd0c03f6b34fc12d2a01a653c01662c1e9eb5347bf8482b3895da1a00ae32dae9dc28cf40f85727e81ff3f4424577520a597436ffb1ac13aa4837bfab49a203ae70f4fa11ce84", {0x6, 0x3, 0xfd735743, 0x2, 0x3, 0x400, 0x4, 0x10000}}) memfd_create(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 04:12:23 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000000)=@caif=@dgm, &(0x7f0000000080)=0x80, 0x800) ioctl$SIOCRSACCEPT(r0, 0x89e3) r1 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x4, 0x2400) ioctl$DRM_IOCTL_WAIT_VBLANK(r1, 0xc018643a, &(0x7f0000000100)={0x400003f, 0x1, 0x33}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 04:12:23 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x7ff00) 04:12:24 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') r1 = creat(&(0x7f0000000140)='./file1\x00', 0x0) ioctl$KVM_S390_INTERRUPT_CPU(r1, 0x4010ae94, &(0x7f0000000000)={0x3, 0x4, 0x1f}) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r0, 0x110, 0x2, &(0x7f0000000180)='nodev\xc7\x00', 0x7) tkill(r2, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x0) socket$nl_crypto(0x10, 0x3, 0x15) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r3, 0x0) 04:12:24 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:12:24 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000740)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f0000000840)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x440a01}, 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x1c, r1, 0x100, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x24000000) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r3) keyctl$reject(0x13, 0x0, 0x0, 0x7, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r4 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r5 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r5, 0x8921, &(0x7f0000000600)) sendmsg(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) fsetxattr$trusted_overlay_upper(r2, &(0x7f00000004c0)='trusted.overlay.upper\x00', &(0x7f0000000640)={0x0, 0xfb, 0x6e, 0x2, 0x9, "46b0bdbd86571c2814c7cd14f4d042a3", "4ae7d41d34b0fe40eeeb0dbeec7387cdc3a4de8973ac4984657d48ef88706b92c08f37172ea723e5700007b86445206b25c499523553bf42df173576aed5060a5b5e1db73ac8543efbdd7897bf605b1f1c545093c9b94b397b"}, 0x6e, 0x3) 04:12:24 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x100000) 04:12:24 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:12:24 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f00000004c0)) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:12:24 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xfffffffffffffe4d) unlink(&(0x7f0000000200)='./file0\x00') r1 = creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) accept4$unix(r1, &(0x7f0000000180), &(0x7f0000000000)=0x6e, 0x80000) r2 = gettid() getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={0x0, 0xd8cf}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f00000002c0)={r3, 0x1a9aa00000000}, 0x8) lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) r4 = semget(0x0, 0x3, 0x200) r5 = getuid() getresgid(&(0x7f0000000300), &(0x7f0000000340)=0x0, &(0x7f0000000380)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe8) fstat(r0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(r4, 0x0, 0x1, &(0x7f0000000580)={{0x7ff, r5, r6, r7, r8, 0x5, 0x6594}, 0x200, 0x5, 0x2}) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) memfd_create(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 04:12:24 executing program 4: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) write$selinux_access(r0, &(0x7f0000000640)={'system_u:object_r:chkpwd_exec_t:s0', 0x20, 'unconfined_u:system_r:insmod_t:s0-s0:c0.c1023', 0x20, 0x6}, 0x66) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000740)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) r4 = shmget$private(0x0, 0x2000, 0x54000c00, &(0x7f0000ffd000/0x2000)=nil) r5 = shmat(r4, &(0x7f0000ffb000/0x3000)=nil, 0x7000) shmdt(r5) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f0000000600)) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) r6 = msgget$private(0x0, 0x3a8) getsockopt$XDP_MMAP_OFFSETS(r3, 0x11b, 0x1, &(0x7f00000007c0), &(0x7f00000004c0)=0x60) msgrcv(r6, &(0x7f00000006c0)={0x0, ""/87}, 0x5f, 0x3, 0x1000) 04:12:24 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x200000) 04:12:24 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000300)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x39) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r2, &(0x7f00000002c0)={&(0x7f0000000180), 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x34, r3, 0x10, 0x70bd27, 0x25dfdbfe, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x10000}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x20004000) r4 = memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r4, 0x0) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f0000000000)) 04:12:24 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) memfd_create(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) bind$ax25(r0, &(0x7f0000000180)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x2}, [@default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}]}, 0x48) 04:12:24 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0xa, 0x0) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f0000000600)) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f0000000740)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x200020}, 0xc, &(0x7f0000000700)={&(0x7f0000000680)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="c11729bd7000fbdbdf2508000000440006000800010002000000080001000800000008000100020000000800010009000000080001005640000008000100200000001400070008000100c5000000080002001f00"/102], 0x6c}, 0x1, 0x0, 0x0, 0x40}, 0x8000) 04:12:24 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:12:24 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x6b6b6b) 04:12:24 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:12:24 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0xf0ffff) 04:12:24 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) accept4$vsock_stream(r3, &(0x7f00000004c0)={0x28, 0x0, 0xffffffff}, 0x10, 0x800) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f0000000600)) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:12:24 executing program 4: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) write$selinux_access(r0, &(0x7f0000000640)={'system_u:object_r:chkpwd_exec_t:s0', 0x20, 'unconfined_u:system_r:insmod_t:s0-s0:c0.c1023', 0x20, 0x6}, 0x66) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000740)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) r4 = shmget$private(0x0, 0x2000, 0x54000c00, &(0x7f0000ffd000/0x2000)=nil) r5 = shmat(r4, &(0x7f0000ffb000/0x3000)=nil, 0x7000) shmdt(r5) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f0000000600)) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) r6 = msgget$private(0x0, 0x3a8) getsockopt$XDP_MMAP_OFFSETS(r3, 0x11b, 0x1, &(0x7f00000007c0), &(0x7f00000004c0)=0x60) msgrcv(r6, &(0x7f00000006c0)={0x0, ""/87}, 0x5f, 0x3, 0x1000) 04:12:24 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0xff0700) 04:12:24 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:12:24 executing program 4: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) write$selinux_access(r0, &(0x7f0000000640)={'system_u:object_r:chkpwd_exec_t:s0', 0x20, 'unconfined_u:system_r:insmod_t:s0-s0:c0.c1023', 0x20, 0x6}, 0x66) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000740)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) r4 = shmget$private(0x0, 0x2000, 0x54000c00, &(0x7f0000ffd000/0x2000)=nil) r5 = shmat(r4, &(0x7f0000ffb000/0x3000)=nil, 0x7000) shmdt(r5) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f0000000600)) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) r6 = msgget$private(0x0, 0x3a8) getsockopt$XDP_MMAP_OFFSETS(r3, 0x11b, 0x1, &(0x7f00000007c0), &(0x7f00000004c0)=0x60) msgrcv(r6, &(0x7f00000006c0)={0x0, ""/87}, 0x5f, 0x3, 0x1000) 04:12:27 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) gettid() unlink(&(0x7f0000000200)='./file0\x00') r1 = creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() poll(&(0x7f0000000180)=[{r1, 0x10}], 0x1, 0x3) lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/uhid\x00', 0x802, 0x0) tkill(r2, 0x39) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x2) ioctl$VIDIOC_ENUM_FMT(r4, 0xc0405602, &(0x7f0000000040)={0x1000, 0x3, 0x0, "9a0f1ab26834ba0f2bf795928bb0ecfd8fd010a55354ccef37287eb77fe97862"}) write$P9_RWRITE(r3, &(0x7f0000000240)={0xb, 0x77, 0x2, 0xffffffffffffffe1}, 0xb) r5 = memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r5, 0x0) 04:12:27 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) memfd_create(0x0, 0x0) 04:12:27 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r2) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r3 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r4, 0x8921, &(0x7f0000000600)) bind$inet(r4, &(0x7f0000000800)={0x2, 0x4e22, @multicast2}, 0x10) sendmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) io_setup(0x3ff, &(0x7f00000004c0)=0x0) io_cancel(r5, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x7, 0x1f, r0, &(0x7f0000000640)="98c43c59ff72828989eeedb8f54701c9e03b9846a0838ac6ea20ff1aede2edf4deef8e5100a8f27743dc8c83c8bea7523793041c8cc4d7ba493c052576d31025a86125723022614dac8c93a21d5dafaefb7c96afa3ca86d01ef65e84fc76e061947e389d3f8ffe88caf0f84154104973bb9920a3a2528da69f6e9910bdb0a672e23400169051c238157558db0e73cb27555a04310d37fd8cc23a378bce8a94044ea883d5fafc208e296d705232859967a068e506b36e6e5ecce57ac4ce0bed01381183d8eed1ccdda50c68b1ad581a08df3c52b712fff0081383c232a9366af9a5e68a05e912f4", 0xe7, 0xb908, 0x0, 0x1, r4}, &(0x7f00000007c0)) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:12:27 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x1000000) 04:12:27 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:12:27 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='schedstat\x00') ioctl$BLKRRPART(r0, 0x125f, 0x0) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r1, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) mlock2(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1) munlockall() [ 2814.139742] syz-executor.5 invoked oom-killer: gfp_mask=0x6000c0(GFP_KERNEL), nodemask=(null), order=0, oom_score_adj=0 04:12:27 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x2000000) [ 2814.193176] syz-executor.5 cpuset=syz5 mems_allowed=0-1 [ 2814.206860] CPU: 0 PID: 14145 Comm: syz-executor.5 Not tainted 4.19.37 #5 [ 2814.213841] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2814.223211] Call Trace: [ 2814.225839] dump_stack+0x172/0x1f0 [ 2814.229498] dump_header+0x15e/0x929 [ 2814.233241] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2814.238372] ? ___ratelimit+0x60/0x595 04:12:27 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 2814.242282] ? do_raw_spin_unlock+0x57/0x270 [ 2814.246722] oom_kill_process.cold+0x10/0x6f5 [ 2814.251259] ? task_will_free_mem+0x139/0x6e0 [ 2814.255785] out_of_memory+0x936/0x12d0 [ 2814.259797] ? lock_downgrade+0x810/0x810 [ 2814.263984] ? oom_killer_disable+0x280/0x280 [ 2814.268503] ? find_held_lock+0x35/0x130 [ 2814.272589] mem_cgroup_out_of_memory+0x1d2/0x240 [ 2814.272606] ? memcg_event_wake+0x230/0x230 [ 2814.272627] ? do_raw_spin_unlock+0x57/0x270 [ 2814.272644] ? _raw_spin_unlock+0x2d/0x50 [ 2814.272664] try_charge+0x1028/0x15b0 [ 2814.272679] ? find_held_lock+0x35/0x130 [ 2814.272703] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2814.272723] ? kasan_check_read+0x11/0x20 [ 2814.272744] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 2814.272766] mem_cgroup_try_charge+0x24d/0x5e0 [ 2814.281941] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 2814.281963] wp_page_copy+0x430/0x16a0 [ 2814.325621] ? follow_pfn+0x2a0/0x2a0 [ 2814.329450] ? kasan_check_read+0x11/0x20 [ 2814.333621] ? do_raw_spin_unlock+0x57/0x270 [ 2814.338059] do_wp_page+0x57d/0x10b0 [ 2814.341799] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 2814.346511] ? kasan_check_write+0x14/0x20 [ 2814.350761] ? do_raw_spin_lock+0xc8/0x240 [ 2814.355022] __handle_mm_fault+0x230a/0x3f80 [ 2814.359453] ? vmf_insert_mixed_mkwrite+0x90/0x90 [ 2814.364299] ? find_held_lock+0x35/0x130 [ 2814.368366] ? handle_mm_fault+0x322/0xb30 [ 2814.372619] ? kasan_check_read+0x11/0x20 [ 2814.376793] handle_mm_fault+0x43f/0xb30 [ 2814.380887] __do_page_fault+0x62a/0xe90 [ 2814.384969] ? vmalloc_fault+0x770/0x770 [ 2814.389036] ? trace_hardirqs_off_caller+0x65/0x220 [ 2814.394069] ? trace_hardirqs_on_caller+0x6a/0x220 [ 2814.398999] ? page_fault+0x8/0x30 [ 2814.402558] do_page_fault+0x71/0x581 [ 2814.406372] ? page_fault+0x8/0x30 [ 2814.409935] page_fault+0x1e/0x30 [ 2814.413408] RIP: 0033:0x4573fb [ 2814.416699] Code: 25 20 06 00 00 b8 20 39 41 00 48 89 15 ce f3 5f 00 48 85 c0 74 08 4c 89 cf e8 31 c5 fb ff 45 85 f6 0f 85 58 01 00 00 48 85 db <48> c7 05 8a cb 2b 00 00 00 00 00 48 c7 05 6f cb 2b 00 00 00 00 00 [ 2814.435628] RSP: 002b:00007fff6d937140 EFLAGS: 00010202 [ 2814.441008] RAX: 0000000000000000 RBX: 00007fff6d937140 RCX: 0000000000413933 [ 2814.448291] RDX: 000005e4dad69731 RSI: 0000000000000018 RDI: 000000000123cc20 [ 2814.455573] RBP: 00007fff6d937180 R08: 0000000000000001 R09: 000000000123c940 [ 2814.462849] R10: 000000000123cc10 R11: 0000000000000202 R12: 0000000000000001 [ 2814.470135] R13: 0000000000000000 R14: 0000000000000000 R15: 00007fff6d9371d0 04:12:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x5, 0x100000000000032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer2\x00', 0x200, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e23, @broadcast}}, 0x7, 0x1, 0x8000, 0x4, 0x394}, &(0x7f0000000300)=0x98) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000340)={r3, 0x79bf}, &(0x7f0000000380)=0x8) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r4, 0x84, 0x7, &(0x7f0000013e95), 0x4) getsockopt$IP_VS_SO_GET_SERVICE(r4, 0x0, 0x29, &(0x7f0000000080), &(0x7f0000000100)=0x68) close(r4) pwrite64(r0, &(0x7f0000000140)="6bbeb99378aa338f6903943df454c8d5326e3252560153f96db6efe2cb42191421f5ccd0e61b6f2a15ec538304c91f6d3855dd841b1a7c95de37467090c3f750f15d1ccde70535af8ddb285a452592b116195127aaf70fcb5b1cb51569cb1d9cdcd129766f370291f73035cfb8d835cc1a39cec4d2937da4ba911fd981a54357453e94ee8f7f2ffa69971cfa282c01579ba3c126a6e059b201802ad64c236b8642e96bd637f1dc", 0xa7, 0x0) close(r4) fcntl$setsig(r1, 0xa, 0x3c) 04:12:27 executing program 3: mount(&(0x7f0000000000)=@sg0='/dev/sg0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='aufs\x00', 0x4000, &(0x7f0000000240)='ppp0GPLkeyring!GPL$security,;\x00') r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r2, 0x0) [ 2814.496439] Task in /syz5 killed as a result of limit of /syz5 [ 2814.503173] memory: usage 307200kB, limit 307200kB, failcnt 322 [ 2814.532388] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2814.556863] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 04:12:28 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:12:28 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) [ 2814.594843] Memory cgroup stats for /syz5: cache:80KB rss:222004KB rss_huge:184320KB shmem:0KB mapped_file:132KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:222076KB inactive_file:0KB active_file:0KB unevictable:0KB 04:12:28 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x3000000) [ 2814.680960] Memory cgroup out of memory: Kill process 7098 (syz-executor.5) score 1113 or sacrifice child 04:12:28 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) memfd_create(0x0, 0x0) move_pages(r1, 0x3, &(0x7f0000000000)=[&(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil], &(0x7f0000000180)=[0x7800, 0xffffffffffff1b7d, 0x0], &(0x7f00000001c0)=[0x0, 0x0], 0x6) write(0xffffffffffffffff, 0x0, 0x0) [ 2814.738759] Killed process 7098 (syz-executor.5) total-vm:72716kB, anon-rss:2216kB, file-rss:35808kB, shmem-rss:0kB [ 2814.763892] oom_reaper: reaped process 7098 (syz-executor.5), now anon-rss:0kB, file-rss:34848kB, shmem-rss:0kB [ 2814.798136] syz-executor.5 invoked oom-killer: gfp_mask=0x6000c0(GFP_KERNEL), nodemask=(null), order=0, oom_score_adj=0 [ 2814.857590] syz-executor.5 cpuset=syz5 mems_allowed=0-1 [ 2814.923276] CPU: 0 PID: 2710 Comm: syz-executor.5 Not tainted 4.19.37 #5 [ 2814.930180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2814.939546] Call Trace: [ 2814.942171] dump_stack+0x172/0x1f0 [ 2814.945816] dump_header+0x15e/0x929 [ 2814.949563] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2814.954688] ? ___ratelimit+0x60/0x595 [ 2814.958597] ? do_raw_spin_unlock+0x57/0x270 [ 2814.963044] oom_kill_process.cold+0x10/0x6f5 [ 2814.967562] ? task_will_free_mem+0x139/0x6e0 [ 2814.972085] out_of_memory+0x936/0x12d0 [ 2814.976087] ? oom_killer_disable+0x280/0x280 [ 2814.980601] ? find_held_lock+0x35/0x130 [ 2814.984697] mem_cgroup_out_of_memory+0x1d2/0x240 [ 2814.989576] ? memcg_event_wake+0x230/0x230 [ 2814.993938] ? do_raw_spin_unlock+0x57/0x270 [ 2814.998371] ? _raw_spin_unlock+0x2d/0x50 [ 2815.002545] try_charge+0xd25/0x15b0 [ 2815.006276] ? find_held_lock+0x35/0x130 [ 2815.010360] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2815.015237] ? kasan_check_read+0x11/0x20 [ 2815.019417] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 2815.024287] mem_cgroup_try_charge+0x24d/0x5e0 [ 2815.028907] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 2815.033865] wp_page_copy+0x430/0x16a0 [ 2815.037806] ? follow_pfn+0x2a0/0x2a0 [ 2815.041632] ? kasan_check_read+0x11/0x20 [ 2815.045801] ? do_raw_spin_unlock+0x57/0x270 [ 2815.050241] do_wp_page+0x57d/0x10b0 [ 2815.053973] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 2815.058662] ? kasan_check_write+0x14/0x20 [ 2815.062924] ? do_raw_spin_lock+0xc8/0x240 [ 2815.067192] __handle_mm_fault+0x230a/0x3f80 [ 2815.071631] ? vmf_insert_mixed_mkwrite+0x90/0x90 [ 2815.076514] ? find_held_lock+0x35/0x130 [ 2815.080603] ? handle_mm_fault+0x322/0xb30 [ 2815.084888] ? kasan_check_read+0x11/0x20 [ 2815.089061] handle_mm_fault+0x43f/0xb30 [ 2815.093149] __do_page_fault+0x62a/0xe90 [ 2815.097229] ? blkcg_print_stat+0xb90/0xb90 [ 2815.101589] ? vmalloc_fault+0x770/0x770 [ 2815.105689] ? trace_hardirqs_off_caller+0x65/0x220 [ 2815.110732] ? trace_hardirqs_on_caller+0x6a/0x220 [ 2815.115680] ? page_fault+0x8/0x30 [ 2815.119246] do_page_fault+0x71/0x581 [ 2815.120962] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2815.123066] ? page_fault+0x8/0x30 [ 2815.135234] page_fault+0x1e/0x30 [ 2815.138694] RIP: 0033:0x4574da [ 2815.141923] Code: 48 85 db 74 b6 41 bc ca 00 00 00 eb 0c 0f 1f 00 48 8b 5b 08 48 85 db 74 a2 48 8b 3b 48 8b 47 10 48 85 c0 74 05 ff d0 48 8b 3b ff 4f 28 0f 94 c0 84 c0 74 db 8b 47 2c 85 c0 74 d4 45 31 d2 ba [ 2815.160849] RSP: 002b:00007fff6d937140 EFLAGS: 00010246 [ 2815.166265] RAX: 0000000000000000 RBX: 00007fff6d937140 RCX: 000000000045737a [ 2815.173552] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000a54fc8 [ 2815.180859] RBP: 00007fff6d937180 R08: 0000000000000001 R09: 000000000123c940 [ 2815.188155] R10: 000000000123cc10 R11: 0000000000000246 R12: 00000000000000ca [ 2815.195532] R13: 00000000000014af R14: 0000000000000000 R15: 00007fff6d9371d0 [ 2815.206018] Task in /syz5 killed as a result of limit of /syz5 [ 2815.212312] memory: usage 304996kB, limit 307200kB, failcnt 323 [ 2815.220133] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2815.231898] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2815.238317] Memory cgroup stats for /syz5: cache:80KB rss:219928KB rss_huge:182272KB shmem:0KB mapped_file:132KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:219992KB inactive_file:0KB active_file:4KB unevictable:0KB [ 2815.262768] Memory cgroup out of memory: Kill process 30539 (syz-executor.5) score 1113 or sacrifice child 04:12:28 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000140)='./file1\x00', 0x0) r1 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r2, 0x0) 04:12:28 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:12:28 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x4000000) 04:12:28 executing program 4: r0 = socket(0x10, 0x80002, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="14000004a10196af36bd0000e9ffffff0000"], 0x14}}, 0x0) recvfrom$ax25(r0, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000180)="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", 0x1000, 0x40800, &(0x7f0000000000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f00000000c0)={@dev, 0x0}, &(0x7f0000000100)=0x14) lstat(&(0x7f00000011c0)='./file0\x00', &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r2) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000001180)={@ipv4={[], [], @local}, 0x4c, r1}) 04:12:28 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000680)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001d80)={{{@in6=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}}}, &(0x7f0000001e80)=0xe8) getpeername$packet(r0, &(0x7f0000001ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001f00)=0x14) getsockname$packet(r0, &(0x7f0000001f40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001f80)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001fc0)={{{@in6=@initdev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f00000020c0)=0xe8) getsockname(r0, &(0x7f0000002100)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002180)=0x80) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000021c0)={{{@in=@initdev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@broadcast}}, &(0x7f00000022c0)=0xe8) getsockopt$inet_mreqn(r0, 0x0, 0x0, &(0x7f0000002380)={@local, @dev, 0x0}, &(0x7f00000023c0)=0xc) getpeername$packet(r0, &(0x7f0000002440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002480)=0x14) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f00000024c0)={@loopback, @multicast1, 0x0}, &(0x7f0000002500)=0xc) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002540)={{{@in6=@loopback, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000002640)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000002680)={{{@in6=@mcast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002780)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000027c0)={'team0\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000002800)={{{@in=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000002900)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002940)={{{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000002a40)=0xe8) accept4$packet(r0, &(0x7f0000002a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002ac0)=0x14, 0x80000) getsockname$packet(r0, &(0x7f0000002b00)={0x11, 0x0, 0x0}, &(0x7f0000002b40)=0x14) accept4$packet(r0, &(0x7f0000002b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002bc0)=0x14, 0x800) getsockname$packet(r0, &(0x7f0000002c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002cc0)=0x14) accept$packet(r0, &(0x7f0000002d00)={0x11, 0x0, 0x0}, &(0x7f0000002d40)=0x14) accept4$packet(r0, &(0x7f0000002d80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002dc0)=0x14, 0x800) getpeername$packet(r0, &(0x7f0000002e00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002e40)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000005140)={'vcan0\x00', 0x0}) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000005a80)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x8200400}, 0xc, &(0x7f0000005a40)={&(0x7f00000008c0)=ANY=[@ANYBLOB="b8080000", @ANYRES16=r1, @ANYBLOB="000429bd7000fedbdf250000000008000100", @ANYRES32=r2, @ANYBLOB="3c00020038000100240001006d636173745f72656a6f696e5f636f756e740000000000000000000000000000080003000300000008000400f8ffffff08000100", @ANYRES32=r3, @ANYBLOB="a4010200400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000900000008000600", @ANYRES32=r4, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r5, @ANYBLOB="3c000100240001006d6f64650000000000000000000000000000000000000000000000000000000008000300050000000c00040072616e646f6d00003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r6, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r7, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f636f756e740000000000000000000000000000080003000300000008000400060000003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r8, @ANYBLOB="08000100", @ANYRES32=r9, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e74000000000000000000000000000008000300030000000800040000040000400001002400010071756575655f6964000000000000000000000000000000000000000000000000080003000300000008000400420f000008000600", @ANYRES32=r10, @ANYBLOB="08000100", @ANYRES32=r11, @ANYBLOB="d001020038000100240001006c625f73746174735f726566726573685f696e74657276616c00000000000000080003000300000008000400f70600003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r12, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400090000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r13, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000600000038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004003f00000038000100240001006c625f73746174735f726566726573685f696e74657276616c0000000000000008000300030000000800040059c100003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r14, @ANYBLOB="08000100", @ANYRES32=r15, @ANYBLOB="a000020064000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b000000340004000800030400000000000009021f0000000600c90707000000050065070000010007000108e565ffffd50509010500000038000100240001006c625f73746174735f726566726573685f696e74657276616c00000000000000080003000300000008000400dc74286308000100", @ANYRES32=r16, @ANYBLOB="600002005c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000002c000400d5007f097f00000001000004060000000800011f010000001f00030709000000090005200300000008000100", @ANYRES32=r17, @ANYBLOB="8000020044000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b00000014000400060001ed18c30000020005800900000038000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004005d0c000008000100", @ANYRES32=r18, @ANYBLOB="2801020038000100240001006e6f746966795f70656572735f696e74657276616c0000000000000000000000080003000300000008000400080000003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r19, @ANYBLOB="38000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000800030003000000080004000000000038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000800030003000000080004000400000040000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b000000080004001f000000080007000000000008000100", @ANYRES32=r20, @ANYBLOB="8801020054000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000002400040000002e0002000000010001cc05000000010006e300000000060009ff0000008040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004000400000008000600", @ANYRES32=r21, @ANYBLOB="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", @ANYRES32=r22, @ANYBLOB="3c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000000c000400a50105ff0000c00040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b0000000800040000ffffff08000600", @ANYRES32=r23], 0x8b8}, 0x1, 0x0, 0x0, 0x800}, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r24 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r24) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) write$P9_RLCREATE(r0, &(0x7f00000004c0)={0x18, 0xf, 0x2, {{0x10, 0x1}}}, 0x18) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r25 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r26 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r26, 0x8921, &(0x7f0000000600)) sendmsg(r25, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) [ 2815.281782] Killed process 30539 (syz-executor.5) total-vm:72584kB, anon-rss:2208kB, file-rss:35812kB, shmem-rss:0kB [ 2815.296428] oom_reaper: reaped process 30539 (syz-executor.5), now anon-rss:0kB, file-rss:34852kB, shmem-rss:0kB [ 2815.366164] audit: type=1400 audit(2000002348.717:8138): avc: denied { read } for pid=14208 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 04:12:28 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x5000000) 04:12:28 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$IMSETDEVNAME(r1, 0x80184947, &(0x7f0000000240)={0xffffffffffffff1a, 'syz0\x00'}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000280)=0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r2, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x400, 0x400) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) ioctl$TIOCGSID(r4, 0x5429, 0x0) poll(&(0x7f0000000100)=[{r0}], 0x1, 0x0) 04:12:28 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000004c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f0000000600)) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:12:28 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:12:29 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x6000000) 04:12:29 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x9, &(0x7f0000000000), &(0x7f0000000180)=0x4) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r2, 0x0) 04:12:31 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') r1 = creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockname$netlink(r1, &(0x7f0000000180), &(0x7f00000001c0)=0xc) r2 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x39) ioctl$TIOCMBIC(r0, 0x5417, &(0x7f0000000000)=0xffffffffffffff15) creat(&(0x7f00000000c0)='./file0\x00', 0x0) memfd_create(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0xffffffffffffff4d) 04:12:31 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:12:31 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x7000000) 04:12:31 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) pipe2(&(0x7f00000004c0), 0x800) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f0000000600)) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:12:31 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000006c0)=@broute={'broute\x00', 0x20, 0x3, 0x2f0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"]}, 0x38e) 04:12:31 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x400) tkill(r1, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r2, 0x0) 04:12:31 executing program 4: r0 = syz_open_procfs(0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000040)=ANY=[], 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) mq_notify(r0, &(0x7f0000000000)={0x0, 0x39, 0x0, @tid=r3}) [ 2818.199363] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 04:12:31 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:12:31 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_BOOT_CPU_ID(r0, 0xae78, &(0x7f00000004c0)) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(r0, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r3 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r4, 0x8921, &(0x7f0000000600)) sendmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) r5 = semget(0x0, 0x4, 0x2) mount$9p_fd(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='9p\x00', 0x200a0, &(0x7f00000008c0)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@cache_loose='cache=loose'}, {@aname={'aname', 0x3d, 'bdevprocwlan1[ppp1:]ppp1&[:'}}, {@cache_fscache='cache=fscache'}], [{@uid_gt={'uid>', r1}}, {@seclabel='seclabel'}, {@measure='measure'}, {@obj_role={'obj_role', 0x3d, 'syz'}}, {@hash='hash'}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@measure='measure'}, {@euid_gt={'euid>', r1}}]}}) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x36) semctl$SETALL(r5, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:12:31 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0xc000000) 04:12:31 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0xd000000) 04:12:31 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000000)='security.selinux\x00', 0x0, 0xfffffdf2, 0x0) tkill(r1, 0x2a) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) rt_tgsigqueueinfo(r1, r1, 0x38, &(0x7f0000000180)={0x28, 0xb4, 0x2}) r2 = memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x0) ioctl$NBD_SET_TIMEOUT(r0, 0xab09, 0x8) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r2, 0x0) 04:12:32 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') r1 = creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x8000800, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, &(0x7f0000000000)={0x81, 0x7f}) tkill(r2, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) memfd_create(0x0, 0x0) ioctl$KVM_ASSIGN_DEV_IRQ(r0, 0x4040ae70, &(0x7f00000001c0)={0x3, 0x5b5, 0x7fffffff, 0x6}) write(0xffffffffffffffff, 0x0, 0x0) 04:12:32 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:12:32 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0xf280000) 04:12:32 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000000)='./file0\x00') creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r2, 0x0) 04:12:32 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000007000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$UHID_INPUT2(r0, &(0x7f0000000040)=ANY=[@ANYBLOB], 0x1) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) write$selinux_load(r0, &(0x7f0000000040)={0xf97cff8c, 0x8, 'SE Linux', "05aaad2337cdd18c7ff84a6d82ec9d2e3436deeb7ec1c49ae7f8"}, 0x2a) 04:12:32 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) r3 = syz_open_dev$midi(&(0x7f0000000180)='/dev/midi#\x00', 0x1, 0x20200) ioctl$EVIOCSFF(r0, 0x40304580, &(0x7f0000000640)={0x54, 0x400, 0x40, {0x100000001}, {0x1ff, 0x6}, @period={0x5d, 0x7, 0x7f, 0x7ffb, 0x5, {0x9, 0x3, 0x7, 0x2}, 0x8, &(0x7f00000004c0)=[0x3, 0x7, 0x100000000, 0x400, 0x2, 0x6, 0x7, 0x7ff]}}) lstat(0x0, 0x0) ioctl$SCSI_IOCTL_SYNC(r0, 0x4) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r4, 0x8921, &(0x7f0000000600)) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f00000006c0)={0x0, 0x1}, &(0x7f0000000700)=0x8) setsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000000740)={r5, 0x2, 0x6, 0x5}, 0x10) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000680)='./file0\x00', 0x0, 0x1000) 04:12:32 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:12:32 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x10000000) 04:12:32 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f0000000600)) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) [ 2819.256626] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 04:12:32 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:12:32 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6(0xa, 0x3, 0x84) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) ptrace$cont(0x38, r2, 0x3, 0x1) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) 04:12:32 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x12000000) [ 2819.509345] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 04:12:32 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = add_key(&(0x7f00000001c0)='.request_key_auth\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)="8add978648d7e63fd42b2fd66e753d5f057ff4105ef506b9610fc4454a7e43fff6d8eb528dd217be190bd25e4abf00d9489e76aa0bb88dcc31dd504a476e0d00d8103795654fe3a8a4deee66c41bba3bbf4129b3fdeeedca887e0acd262e5283a24cab3095bb204ead91a84c283050c35ebc92989cbc106272afd4502f6e196be43052c676498ae4bd7e77fd", 0x8c, 0xfffffffffffffffb) keyctl$setperm(0x5, r1, 0x100) r2 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x39) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYBLOB="b400000090d67ef0cc79912ac04020b7c643d762677a2158c373cd1456aa49148244ec027824df16a432236b5fe3b8c6cb4ecd7d3bb30c06423b32c431ed2c357238602c9fce779d3324fabfecd719606b9c103fb4e09b6f05fd477d251a1cff37a9667fabc7fc05ebcfb4e49cd6adf6fc9e4b3374687ef1e54bb238138bd7e822f3e70f883598a3e1e32caa20ee0e63a40b49c49e652fa01ad533c66ba01910e5cc72fe21851579e4ee8d312bd2321a36eb5582a01c0180"], &(0x7f0000000000)=0xbc) setsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f0000000180)={r4, 0x531}, 0x8) memfd_create(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 04:12:32 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) openat$ion(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ion\x00', 0x200, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000006c0)='/selinux/policy\x00', 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r4 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r5 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r5, 0x8921, &(0x7f0000000600)) sendmsg(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000640)={0x8, 0x0, 0x10001, 0x6}) ioctl$DRM_IOCTL_SG_FREE(r1, 0x40106439, &(0x7f0000000680)={0x8001, r6}) prctl$PR_GET_PDEATHSIG(0x2, 0x0) setresgid(r2, r2, r2) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) lsetxattr$trusted_overlay_opaque(&(0x7f0000000700)='.\x00', &(0x7f0000000740)='trusted.overlay.opaque\x00', &(0x7f00000007c0)='y\x00', 0x2, 0x3) 04:12:32 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r0, 0x4048ae9b, &(0x7f0000000040)={0xa0000, 0x0, [0x3ff00000000000, 0xc228, 0x0, 0x3, 0x8, 0x0, 0x101, 0x2]}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, &(0x7f00000003c0)=0x20, 0x4) poll(&(0x7f0000000400)=[{r2, 0x404}, {r1, 0x20}, {r1, 0x2}], 0x3, 0x81) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$P9_RLCREATE(r0, &(0x7f0000000140)={0x18, 0xf, 0x1, {{0x92, 0x1, 0x8}, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xa462, @rand_addr="65d619a6f114ca453a0ff60d4a0591a2", 0x100000000}, {0xa, 0x4e23, 0x2, @empty, 0xa11}, r3, 0x1}}, 0x48) write$cgroup_subtree(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x3ff800) setsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000100), 0x4) 04:12:33 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') r1 = creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x39) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x0) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000280)={{{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in=@dev, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f00000004c0)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000500)={0x0, 0x0}, &(0x7f0000000540)=0xc) getresuid(&(0x7f0000000580), &(0x7f00000005c0)=0x0, &(0x7f0000000600)) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000640)={{{@in6=@initdev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@dev}}, &(0x7f0000000740)=0xe8) stat(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) splice(r1, &(0x7f0000000000), r3, &(0x7f0000000a00), 0x4, 0xb) getresuid(&(0x7f0000000840), &(0x7f0000000880), &(0x7f00000008c0)=0x0) r12 = getgid() r13 = getgid() lstat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='system.posix_acl_default\x00', &(0x7f0000000b00)=ANY=[@ANYBLOB="02000000010004000000000002000300", @ANYRES32=r5, @ANYBLOB="020004006b15b8b64bb079d791d864ae9b1a98a756ed21ee63169aefcc973ef192b890b79956956956f73865d38ac7fa58fc2a1b2b9a9ae1e79b8a4461bf676898f7ba775ef2211ad30a7ff24c7e5c7fa749016de256d66a3c74e0936dfd64c8b6f9cde4f7a84d3ea7dbc596bd8347ff3c2fc3b35b83659262fe0932bcaae7ec", @ANYRES32=r6, @ANYBLOB="02000600", @ANYRES32=r7, @ANYBLOB="02000700", @ANYRES32=r8, @ANYBLOB="02000600", @ANYRES32=r9, @ANYBLOB="02000000", @ANYRES32=r10, @ANYBLOB="02000100", @ANYRES32=r11, @ANYBLOB="040000000000000008000200", @ANYRES32=r12, @ANYBLOB="08000200", @ANYRES32=r13, @ANYBLOB="08000600", @ANYRES32=r14, @ANYBLOB="10000200000000002000060000000000"], 0x74, 0x3) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r4, 0x0) renameat2(r1, &(0x7f0000000a80)='./file0\x00', r1, &(0x7f0000000180)='./file1\x00', 0x2) finit_module(r1, &(0x7f0000000a40)='\x00', 0x2) 04:12:33 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x15000000) 04:12:33 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:12:33 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) clock_getres(0x0, &(0x7f0000000000)) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) ioctl$PPPIOCSPASS(r0, 0x4004743c, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000003c0)={0x7ff, 0xfffffffffffffff9, 0x7, 0x5, 0x9, [{0x9, 0x0, 0x7, 0x0, 0x0, 0x88c}, {0x1ff, 0x0, 0x2a, 0x0, 0x0, 0x5}, {0x1000, 0x0, 0x8000, 0x0, 0x0, 0x208}, {0x800000, 0x2f2a, 0x7fff, 0x0, 0x0, 0x80}, {0x6, 0x4, 0x100, 0x0, 0x0, 0x210c}, {0x4, 0x10000, 0x3, 0x0, 0x0, 0x801}, {0xfff, 0x4, 0x81, 0x0, 0x0, 0x2401}, {0x200, 0x7, 0x0, 0x0, 0x0, 0x100}, {0x4, 0x8, 0x80000001, 0x0, 0x0, 0x1000}]}) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x200000, 0x0) ioctl$DRM_IOCTL_AUTH_MAGIC(r1, 0x40046411, &(0x7f0000000080)=0x4fc) 04:12:33 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f0000000600)) ioctl$RTC_WIE_OFF(r0, 0x7010) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) [ 2820.109476] syz-executor.4 (14380) used obsolete PPPIOCDETACH ioctl 04:12:33 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:12:33 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x18000000) 04:12:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000380)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f00000003c0)={0x0, 0x106}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000440)={r2, 0x10000, 0x80}, 0x8) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r4, 0x0, 0x2a, &(0x7f0000000280)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_group_source_req(r4, 0x0, 0x2b, &(0x7f0000000140)={0x2, {{0x2, 0x0, @empty}}, {{0x2, 0x0, @rand_addr=0x101}}}, 0x108) ioctl$VIDIOC_ENUM_FMT(r1, 0xc0405602, &(0x7f0000000480)={0x9, 0x0, 0x1, "86dfc52def2ebfe2d4c0f9976c57591fa62e251bc93c534fe2a28b728945fe19", 0x32344d59}) r5 = dup2(r3, r4) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000040)={{{@in=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@empty}}, &(0x7f0000000340)=0xe8) setfsuid(r6) 04:12:33 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:12:35 executing program 1: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x4) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) socket$inet6(0xa, 0x4, 0x6d0f9869) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) memfd_create(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 04:12:35 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x1f000000) 04:12:35 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r0, 0x800442d3, &(0x7f00000004c0)={0xc0b, 0x2, 0x230b, @broadcast, 'caif0\x00'}) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f0000000600)) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:12:36 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r2, 0x0) 04:12:36 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f0000000000)="a2e6fa9a", 0x4) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r1 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x3, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000700)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000006c0)={0xffffffffffffffff}, 0x106, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000740)={0x8, 0x120, 0xfa00, {0x2, {0x5, 0x101, "a016a47582f54d4841fc10cba3df48e6609216c00b39143ce0a77b810234d9ba5e466c5141a3c7612563a13641a7fba7efdc1f5798cbc7363d4dac3a85dc6298d1979646835596e6ac0a0bb0e09dc646c73b64f702cfea8201921f20fdf83b225b2e28bb0fe22e28264fea62c468cf70fcec97623d1ae48e9c901783252c6657270d1c905de2d0f8cfb7608254c44e7d032eb974e199d3cf0ba18ff200bf1f83d1ad0648723510705d14c0847a125159f9c3ed1ad19cac55a689ca032004e6fff0c6055ea0a805725b1c96288ebb944620bdcb7444e9d2f5671e071c626810dbd2707b9d06de7f9a7d477905340785f33fbf344714cd640e2f2e16d7884567f0", 0xe6, 0x8, 0x2, 0x6, 0x5, 0x0, 0x4000000000000000, 0x1}, r2}}, 0x128) r3 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)="5afd324f23a8e022814df7869b102d137cf6a0909b0cc1e877a58cd07884d221597ff4a6f579b6ca9337da817f4019f5b9db522d84fac4", 0x37, 0xfffffffffffffffd) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000600)={'syz', 0x3}, &(0x7f0000000640)="82e7356d62a007c4d97c61a3da9b768c4d0b02f2d67525b621306a3aaaf62ee97bbff4109a0acf5f22da64b122013606b5c0e089c3472bdfadf78694f99166e2f593f04fdc92e52fd83e4c76825f55dafaee9f3e0accca4a2b834c729ce1bc69b91d1acea075f00e559662afbd", 0x6d, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, r3, &(0x7f0000000540)=[{&(0x7f0000000280)="9c3a71fd314ca19e122821c0545f5ac871bbde7ec95090f58a51c5885f1837bb536f7967f3c18396a0bb92d360c32c5a29ece8c7c04f7ac94e08ae6e32cad7b5d67750370389", 0x46}, {&(0x7f0000000300)="9160c3de08b76491f5e21458e7e2f936f6dcb9ca49d1ac5330926aaaadf789e01f7aef48782ee6710b422731f3a86f374ccded9bb7bc51d5f723d2b80675c2860569e253a73ce356ce2bd359a4b0d05bacb3660ffc30e267c23cd2e7b759b75e0a9e7aa0225123553fd4d01e25ceac9eb78a95b3246c8b2e41e20e5eacfaddf5a5471b35ae95", 0x86}, {&(0x7f00000003c0)="f50116b3cc6808bc0f6b6ca8bfe46ff19fb9f0551ef77b6d1386e7dd380072013ce2febbe2b29ea067e4fcd1d5a4c4dd9d6b3da2d6ee95f8629e83430c9c98183a2ad3a5bdff5d1ff5d171ba21f16b007729ccbb782c340ea613c838e09957817fc0a77a9fa6721bac6a3aa6ff56beb8a2da2716cf29041b97bbcd7a444e5149f9920b58746cd7d111829acb7e93fd131bde4748c124bdd7f6c2c3324bcf9165d688a8ecabb60a0e5ba68cc2f0e2b7ad2fbfdbcc14a70fc9", 0xb8}, {&(0x7f0000000480)="eb1f4e5103b8cff510d88b3379debe1c8d6fdaa521653c08d99ea0b3106bd9b6c11d70843acad5fec367218220822bb162745550ee8e1791a40593da8ee64a7888e566239a983b2e05db1ff9bfe29a6a175120b14bfef31af7db919a462a89", 0x5f}, {&(0x7f0000000500)="0e5bc45ecbfcdf87a26b900fbe4ba2f0886794d8dd013ee34a07896cd98cb0f31a4c195c62e850338007cf2d16d390ad43", 0x31}], 0x5, r4) ioctl$SG_GET_PACK_ID(r1, 0x227c, &(0x7f0000000100)) sendto$inet6(r0, &(0x7f0000000200)="ce0410000013000000911efc1fb35c22cc6dc37916215963e155308f3a7b06345ed9cc0542627d8599b512eceb92bd3096bd845011399e975050d8fcb3f60b3ea107ba16215a7232217e7ab8956068ae56bd82af", 0x54, 0x0, 0x0, 0x0) 04:12:36 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:12:36 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x20000000) 04:12:36 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) r1 = request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) keyctl$reject(0x13, r1, 0x0, 0x8, r1) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r3 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r4, 0x8921, &(0x7f0000000600)) sendmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:12:36 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') r1 = creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) mq_getsetattr(r1, &(0x7f0000000000)={0x4, 0x4, 0x1fc, 0x0, 0x6ce4253e, 0x800, 0x6, 0x1}, &(0x7f0000000180)) tkill(r2, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) memfd_create(0x0, 0x0) epoll_create1(0x80000) write(0xffffffffffffffff, 0x0, 0x0) 04:12:36 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x28000000) 04:12:36 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123d319bd070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/rt_cache\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000040)=""/47, 0x2f}, {&(0x7f0000000080)=""/18, 0x12}, {&(0x7f00000000c0)=""/22, 0x16}, {&(0x7f0000000180)=""/83, 0x53}, {&(0x7f0000000100)=""/8, 0x8}], 0x5, 0x0) 04:12:36 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:12:36 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x3f000000) 04:12:36 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0xffc6) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, &(0x7f0000000040)=""/27, &(0x7f00000000c0)=0x1b) r1 = open(&(0x7f0000000100)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[], 0x200) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x1000000000000000, 0x0, 0x5, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 04:12:36 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) fanotify_init(0x1, 0x181000) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) ioctl$TCGETA(r0, 0x5405, &(0x7f00000004c0)) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f0000000600)) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) [ 2823.948691] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 04:12:37 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') r1 = creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@loopback, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000340)=0xe8) getresuid(&(0x7f0000000380), &(0x7f00000003c0)=0x0, &(0x7f0000000400)) fstat(r1, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_xen(&(0x7f0000000000)='\x00', &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)='9p\x00', 0x842000, &(0x7f00000004c0)={'trans=xen,', {[{@access_user='access=user'}, {@nodevmap='nodevmap'}, {@cache_fscache='cache=fscache'}, {@privport='privport'}, {@cachetag={'cachetag', 0x3d, '\x88])+\x00'}}, {@access_any='access=any'}], [{@fowner_gt={'fowner>', r3}}, {@fowner_lt={'fowner<', r4}}, {@uid_eq={'uid', 0x3d, r5}}]}}) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r6 = memfd_create(&(0x7f0000000100)='\x88])+\x00', 0xfffffffffffffffc) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r6, 0x0) 04:12:37 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:12:37 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x40000000) 04:12:37 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f00000004c0)) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) r1 = request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) keyctl$reject(0x13, 0x0, 0x2, 0x8, r1) write$capi20(r0, &(0x7f0000000640)={0x10, 0x0, 0x0, 0x83, 0x9, 0xfffffffffffffff7}, 0x10) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r3 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r4, 0x8921, &(0x7f0000000600)) sendmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:12:37 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 2824.621955] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2824.750479] audit: type=1804 audit(2000002357.532:8139): pid=14472 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir678550451/syzkaller.8IMJnU/622/file0/file0" dev="sda1" ino=17438 res=1 04:12:37 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) getresuid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)=0x0) quotactl(0x8001, &(0x7f0000000240)='./file0\x00', r1, &(0x7f0000000340)="539c42345d658d3642b58f19f4e85b4760682762c91d1a274750e4e09adcad5e112ee6d1a292669a9407d180e606891639445de08e0792f9423f1fc9effe6ddb6539f0ee61efed6ae264d877fc1805f4ad2b361ab3767dc116ce92555c2f83a48a71789ce7e79d7fcf32191995c47ebe7d1b6ad7313fbec7cad936b30dfd1b8e2fb3316b075eb9f62528a0924d465678d107bd80de9c182dd1655d0fa0232c92fa129e37a53c280a8773930e183a1980728132f3d8ab90e9776391b83331c11439245ffa099da778dbf79fea41e07f92a55cf87a0ef4891c69c20b8836cf121bf8a285f22d6095dc2e162816a9fb3989513dec08918c") write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') epoll_wait(r0, &(0x7f0000000180)=[{}, {}, {}, {}, {}, {}, {}], 0x7, 0xf070) creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ioctl$SG_EMULATED_HOST(r0, 0x2203, &(0x7f0000000000)) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) memfd_create(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 04:12:37 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x6b6b6b00) 04:12:37 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:12:37 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000300)=0x27fff, 0x2) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000240)) r1 = creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) ioctl$CAPI_GET_PROFILE(r1, 0xc0404309, 0xfffffffffffffffe) tkill(0x0, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = memfd_create(&(0x7f0000000100)='\xea)\x00\x94\x00', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r2, 0x0) 04:12:37 executing program 4: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) fanotify_init(0x1, 0x181000) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) ioctl$TCGETA(r0, 0x5405, &(0x7f00000004c0)) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f0000000600)) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:12:37 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000006c0)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f0000000600)) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:12:37 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x80040000) 04:12:37 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') r1 = creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x39) bind$rose(r1, &(0x7f0000000000)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1, @null}, 0x1c) creat(&(0x7f00000000c0)='./file0\x00', 0x0) memfd_create(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) [ 2824.995889] audit: type=1804 audit(2000002357.607:8140): pid=14472 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir678550451/syzkaller.8IMJnU/622/file0/file0" dev="sda1" ino=17438 res=1 04:12:37 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:12:38 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x80280000) 04:12:38 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) lstat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r4 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r5 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) socket$rds(0x15, 0x5, 0x0) ioctl$SIOCGIFMTU(r5, 0x8921, &(0x7f0000000600)) sendmsg(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000640)={0x0, r3, 0x0, 0x1, &(0x7f00000004c0)='\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0xffffffffffffffff, r0, 0x0, 0x1, &(0x7f00000006c0)='\x00', 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000740)={r6, r1, 0x0, 0x1, &(0x7f0000000680)='\x00', r7}, 0x30) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) [ 2825.235526] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 04:12:38 executing program 4: open(0x0, 0x0, 0x0) r0 = creat(0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) ioctl$sock_inet_tcp_SIOCOUTQ(r1, 0x5411, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0x0, @dev}, {0x2, 0x0, @remote}, {0x2, 0x4, @broadcast}, 0x10e, 0x4000000000, 0x80000000000, 0xfffffffffffffffe, 0x0, 0x0, 0x1000}) r5 = gettid() ptrace(0xfffffffffffffffb, r5) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000740)=@req3={0x101, 0xfffffffffffffffa, 0x0, 0x0, 0x8000, 0x6, 0x5}, 0x103bb) rename(&(0x7f0000000200)='./file0\x00', &(0x7f0000000700)='./file0\x00') ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000280)={'bpq0\x00', {0x2, 0x0, @multicast2}}) fcntl$getown(r2, 0x9) fcntl$getown(r4, 0x9) fcntl$getown(r4, 0x9) fcntl$getownex(r4, 0x10, &(0x7f0000000140)) getpgrp(0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000180)) fcntl$getown(r0, 0x9) getsockopt$EBT_SO_GET_ENTRIES(r2, 0x0, 0x81, &(0x7f0000000600)={'broute\x00', 0x0, 0x4, 0x64, [], 0x1, &(0x7f0000000400)=[{}], &(0x7f0000000580)=""/100}, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={'syz_tun\x00'}) ioctl$sock_inet_SIOCSIFDSTADDR(r3, 0x8918, &(0x7f0000000240)={'\x00\x00\x00\x00\x00\x00\x00\x00\xce\x1a\xfah\x00', {0x2, 0x80000000000000, @loopback}}) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sched_yield() 04:12:38 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:12:38 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x8cffffff) 04:12:38 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', r1) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r3 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r4, 0x8921, &(0x7f0000000600)) sendmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) [ 2825.525362] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 04:12:38 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') r1 = creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000000)=@assoc_value={0x0, 0xfffffffffffffc01}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000240)={r2, @in6={{0xa, 0x4e23, 0x25, @dev={0xfe, 0x80, [], 0x1f}, 0x1}}, 0x0, 0x0, 0x3, 0x9, 0x80}, 0x98) r3 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) fsetxattr$security_ima(r0, &(0x7f00000001c0)='security.ima\x00', &(0x7f0000000300)=@sha1={0x1, "de23b90e558e4f834bdf9734683774b2b494edbe"}, 0x15, 0x2) ftruncate(r1, 0xbd) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r4, 0x0) 04:12:38 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f00000001c0)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) memfd_create(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 04:12:38 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0xa1ffffff) 04:12:38 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:12:38 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000840)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r0, &(0x7f0000000940)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x44400040}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x1c, r2, 0x2, 0x70bd28, 0x25dfdbfc, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0xfffffffffffffffa}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000090}, 0x840) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) r3 = request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r4 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r4) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r5 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r6 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r6, 0x8921, &(0x7f0000000600)) keyctl$get_persistent(0x16, r1, r3) sendmsg(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) setxattr(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)=@known='trusted.overlay.nlink\x00', &(0x7f00000007c0)='{&system\x00', 0x9, 0x3) semctl$SETALL(0x0, 0x0, 0x11, 0x0) recvfrom$x25(r6, &(0x7f0000000640)=""/156, 0x9c, 0x0, &(0x7f00000004c0)={0x9, @null=' \x00'}, 0x12) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:12:38 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:12:38 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0xe0ffffff) 04:12:39 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:12:39 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x4200) r1 = accept4$ax25(0xffffffffffffff9c, &(0x7f0000000040)={{0x3, @netrom}, [@netrom, @netrom, @remote, @null, @rose, @null, @default, @rose]}, &(0x7f00000000c0)=0x48, 0x800) connect$ax25(r1, &(0x7f0000000140)={{0x3, @null, 0x4}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}, 0x48) 04:12:39 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0xe2010000) 04:12:39 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000000), 0x4) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xc004ae02, &(0x7f0000000180)={0x3, [0x0, 0x0, 0x0]}) unlink(&(0x7f0000000200)='./file0\x00') r1 = creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r1, 0x5201) tkill(r2, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) ptrace$setregs(0xd, r2, 0x35, &(0x7f0000000240)="9ec952f9e713f532282fdb668be3e7625bfd8da1f135af83f9573f8eb69fb613e6b588436ba58199831e0a6d1c1124decaff4b302d6454e552c783deb18cc63f4fb09b5f7bc2e8aaeaf6079c687a52a291f7c77528ca4328f89372a9ad0520adc5f6787c98bba42c87de202953a21fb9a4cd2b96715492c99ad6a71d1ed8d32420b82a1f4aea4c2fb8ad4edb5d6d1017c20b86690c5068d1289ffd262d10b8f48b2d56d003cc4a56c6c59ced") r3 = memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r3, 0x0) 04:12:39 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:12:39 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r3 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r4, 0x8921, &(0x7f0000000600)) sendmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000680)={0x0, 0x4, 0x30}, &(0x7f00000006c0)=0xc) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000700)={r5, 0x5}, &(0x7f0000000740)=0x8) prctl$PR_GET_PDEATHSIG(0x2, 0x0) renameat2(r4, &(0x7f00000004c0)='./file0\x00', r0, &(0x7f0000000640)='./file0\x00', 0x7) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:12:41 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e21, @empty}, 0x10) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000140)='./file1\x00', 0x0) syz_mount_image$ceph(&(0x7f0000000180)='ceph\x00', &(0x7f00000001c0)='./file0\x00', 0x7, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)='threaded\x00') clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) memfd_create(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={0x0, {0x2, 0x4e21, @empty}, {0x2, 0x4e24, @local}, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x230, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000240)='syz_tun\x00', 0x1, 0x7, 0x7fff}) 04:12:41 executing program 4: r0 = socket$inet6(0xa, 0xe466b2bd6bc98e3f, 0x4) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000140)=0x3) listen(r0, 0x7d3) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000)=0x2, 0x4) r1 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x10001, 0x2) ioctl$SG_GET_VERSION_NUM(r1, 0x2282, &(0x7f00000001c0)) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040)=0x20, 0x4) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(0xffffffffffffffff, 0x5386, &(0x7f0000000080)) 04:12:41 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:12:41 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0xe4ffffff) 04:12:41 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(r0, 0x0, r0, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) mkdir(&(0x7f00000004c0)='./file0\x00', 0x1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f0000000600)) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:12:41 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(r0, &(0x7f0000000780)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x88004043}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r1, 0x408, 0x70bd27, 0x25dfdbfd, {}, [@TIPC_NLA_NET={0x50, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_NODEID={0xc}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x3}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x80000001}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4c}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x5}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x10}, 0x40000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(r0, 0x0, r0, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) r2 = request_key(0x0, &(0x7f0000000680)={'syz', 0x1}, &(0x7f0000000640)='vboxnet1\x00', 0xfffffffffffffffb) r3 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r3) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f00000009c0)={r2, 0xa5f, 0x400}, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000a80)="c7de8cfed11ee0042af441fb64c38bf051357cf674a94aae0d8ef6c86e9c331d94a1fbb4f35c9b5cde322241b959675f919d9ac55ef66e7899adadffafc1c95817e708dfa660f21a983a", &(0x7f0000000b00)="375bd477630ece0cc1887653fa0237014583d11458469feb5f44eac1c2ba47209f24594fa64fcc6b013d7e66f7533a2e33aa606968") r4 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) r5 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r5, 0x8921, &(0x7f0000000600)) sendmsg(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) statfs(&(0x7f0000000400)='./file0\x00', &(0x7f0000000d00)=""/255) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000b80)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r0, &(0x7f0000000980)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000840)={&(0x7f00000008c0)={0xb0, r6, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DAEMON={0x40, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6tnl0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x2}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x7}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x100000000}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_DAEMON={0x40, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x3f}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7d}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}}]}]}, 0xb0}, 0x1, 0x0, 0x0, 0x40}, 0x4040) 04:12:41 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0xf4ffffff) 04:12:41 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:12:41 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) r3 = syz_init_net_socket$ax25(0x3, 0x5, 0xcf) ioctl$SIOCAX25NOUID(r3, 0x89e3, &(0x7f0000000040)) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f00000012c0)=""/167, 0xa7}], 0x1}}], 0x96, 0x0, 0x0) [ 2829.631956] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 04:12:42 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f00000063c0)=""/197) tkill(r1, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r2, 0x0) r3 = getuid() getgroups(0x4, &(0x7f0000000980)=[0xee01, 0x0, 0xffffffffffffffff, 0x0]) getresuid(&(0x7f0000002c40), &(0x7f0000002c80)=0x0, &(0x7f0000002cc0)) r6 = getegid() sendmmsg$unix(r0, &(0x7f0000006240)=[{&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000640)=[{&(0x7f0000000240)="c8383b713f1222080cfc3f78805e0a8117c33fcbed81ab3eaec5d8ed236088949fe4e5da80d4acf4d81db69d2fa17e31d4a2ab0f4506247882f5613b130cc67800c3f3b38be1eb1fa96b747ef1ef68ed2eeca12e14180273e2e1289e17e7bb09848183d2a9afde029e9e83924ab7b08728f7b13ec04abf7ada924dfedbd65a3f21a2e6d0eb237f610d4484e78abbf7022995b758cf0a527fa09f0c26c5cc6b376ffaa235231541846af32af360134599e510ee3c2ae6c9929e655fe3890189c4dad46e7f2c911cb109cdf7ddcca0dbfedf09970979f52254e9a233af7526216ccc072ccd", 0xe4}, {&(0x7f0000000a00)="6f1e876a2977c3e35c76140eaa94e4800d1360413054e3b0303110914b298485ef46213085bf11159ae1c3135ed6c267e5c956239201f6c0e01dd3b1d8940fe0128e5dfe54557c26e7d89a2067d25ff865032eab06217b8116653dda1fc2fa9a113765a994ee7649d2f7dd2f484b70c27bb88e859b71988cf1bd8eddaf43281dba0be0ce7971c2180cf94cf020ca2a3323058c111e94dca60976291e5ad087f75e432c8b3511d009826efc0872b3d386db5e9ae5761d3a3ff15a69246ef8861e393529e378cc4666ef557a67bf4748f30b83b5235858b4f8986169ee9fc9f126184339c5daa572ab73bae171d6fa7f33aea8d0431fa70fc8d49151b2450e99a2e84b621fcc6a1953a94bec307f7002efe63c491ddb7e098c7e331d322c836808a0c53d7f8b1aa01369dd7febefb8399b48facd8a3cd528e33d3adfe9406e8eb6f2122026265e4b4c86a5bac019d7befffd8df1a7f0452989c4b26ff29d4a7047758b0c2e671fca0a50f84a462024953fe247a1736e30c75b110a334f6e5a6d78cf77f80705f97c19a3b4fd59cb30ee67cc80e4cef1dafa56b7f1df2771f4761f0c40bb2a40c0130d7bac21396460f4ff7954a4689f41d849094662b094539ef23047d319d66585276eddfb973987fafa001a5dc7fb608750ea71d84c116f264a92aa07486e10093c219012a7afea886b00aa9037a0b100b2cc16a1b15cfa79e141f22db8cddb9f12f26a49aa824f611842885789e499d651c3a3ee225495b1875ada673d7eeec4a3728f22595c134cfaa7062520098da365ee3d4bff1880d5eaa415f2aa56ddb027c247d1e8633691e29f9546d09c4d7fb8198ed287a34f1a2d1e85f71b1eb42986ffd9c01a8781ca7e5ad5cd3d824bd0fa3c608a9670a4a98486037726328045623cd41d912531c15242259b8a08fbb95d377666d6eedb1101f52a7f38236d01e12e511147fad1ecdb223aecc14bbc412a73b98640fb5ffa0536dffd3956168aaa40e675aafb05161aabbfcc6f8b6ef277e5fcbbaadb61a5b506e1e8d739bd7894493762f9173ba2494f1ebb26dd4ab712b24aaf6c7736e2e7ae2d35c54871ba8321c91f14642f805540dcd8a3d5081b906c5b8eb8a2086d9a4d6c6bcf552bffc6a73d0bad6a9c88bd0b10fdc09532e75d04db7dc1224d39643de0cb00c67b391720d0ae21f997b483937558115266a685b813f917f7fcd9792e02b5123bb6a0280306bf52f8a63e016a67a2d39a2841a8b91d0bec9def8a6b4398555957235e39d8bc4c794fa940f17f548db4fc5b63839c1cbe5e00b3e8b464624cc1e853484003f13780adacda0e8ee6d1707e4cf7c6939e44ae926a1861672f6853e115c69223bdffa665919edd4cd8526c691e719cb57435e404687de691a3c6d2690788952be25686dbc9c87135eaafdab233132f85295fd4ed8d5bae890b48fce6f15832bfd48313cd6b365c3b5395d50621bac4c9837ab4680321b19c14f5af095b2f896e68f3c7409d026eb4ab33662fdd7bea3880891c1d90e71a6812586bd09e6f08ed17822dacabb83a0ecd176cb2c72e062dc2810b1c7379f675c12d26edf27898ef02bd7c6659151c02858b99ab110763ccf22813e7aa2e98dbd2a421c15fccb337db776700eae9317169b95ee7fb894d7723bb65fa2494e50771fee491ad8225ca6e0521949296874aaa32e80e680c61ced579dacfc8d9f8938501f024a8d3f79f53b9cb305de87336356ceb9fb21003f3ad54704b0e1625e0c4ff85edaf80ae70d3055b15c6bbbf0c2c2dcecd2264bf0c92b84561eccabe9cb422d247b3154281977059a5da697ee976cc93b8281bcbeb45147e73c8716d3b398ceceb91ccfbaa3e2e75b97e1dcc706983801efbd214862913ce29e552084f9d826d24a771c5219a79a058c0da3639233835b687b121529d84fa638e936767449360de6c4a4fcf4cd6e63b9cc9b9d24e64032e0882e4f47ebb6084d4f363886d55e0c4abd8afa0d7a093b0706839a8d9923a54a9bcd18eb59d9ab53a4e26113d6980da2013a91d2645b5fcaea8275a6083514a37323b39c485fd1e6d0cc58affbd6d9faf9110678e2771810ec9446036589b1866508c14aa4057babac82c0c8b8ec40ffeece8bf4027a4198b0095796e78fbe050321dca2f32060ffd7b1f2258ee1622156367b0431266f13cfb59a46d24a01e3f79a8e1c54602c4be3cd1ad51c9ada97fba3e89ebec7a0f12a5be458da5f50a5c2d816fe02233de3665af70363bec88a691fdf6ddb0ee97f25788f2ff7734a037d7f7ef816f662eb36f644181201f270fba70f5d6b0516599ebcebbfc1a9981983013d24a003eea5d4e65cdc7fd6e5e5e92f04ce746fbfd8643a80ebbd485bd4095102f2af3bd24978bd04b014562d9c3b2aae811e24a456e745df429aa1c470826406b9f32612876a41de888867043c3cf223df740ec5633890e4a1599697fa7125d0290a10f1cb0a7a41604571afae51988688b124141a4eb3a96c6ea75bf984b630c7ba521c8ad700807785209a86276fc8bcf51c698a685c5ca5441fd7e2e76323d2a1ee22ecb358edea65d4949f23619fc9a90765fad3173061a3d6860ba82aeecde5b378925378582441392a48a0b9e55753c37f999f671dc9d05090fec659d90af2212db62b0f33d15d1bfe8b57a588e5fdb1441983158da0e15d94742dba6b60a542419d707260847e9052a4d94db5100bfbabc0829becf50481b693072181a60b570e04f8f92469128f92d2f06b7aba8cb4c7dffcdc4f48437fcea8ae405476c0b46d9d8d5dba2878a88889158f68d42866dfef12f776c4d8cb579c6a7c3a0f958c4c04996117ca0f55e145756b335a223517f84e9507da83fabc3b7b6a83e0625c77b90cafd780046c496d341688a5230a1d071d5cb688aca9d41db9db0c111cc6f34a46b0fc488c2e0ac103edec0649ba0f1f71096c5374276af9a7f4ac33df24b3028da3eff95df4c674ca342ee148275c28abbb1f3fb40f3e3d7a8d5cd887b4b3474b918c9cab3271f725416e1a215144fd6bc556062b6f0fe625e5b1ed4629fd27d6adfa9a4bcbf5902816592a2846436be954cb4ae3df36257cf04bc74349ef122b89af40a3dd0c2fa2e69f6ca4e4d6237d88191bdc6c9300426f5381a0ffa00ec630f4614a35e0ba5fbdadbf8bd71e0c4a791d8bc210c21b9a42b408e8070ca4c57fd3f69bbea130bb6f4abe7f5554b03f2a5cd5125b39ea96785dd295f48e80b543552c20b186f75619eb921516b35efeebf26221c8ecdbc13ad07bdb45917758fbe53effb0d6011fddba701fd22a3beb2b5245df14187be6d416e6174b850999b269b1d523d5bc922e7d6d67f33ef1c627004e90b9fe4b2b0afbd93354b223392c22a4604e8555ad433a51f4e14f1ba39836d0bc8325695a49140ff8543df84659bfbbeabffe2347b5bf5af4ac24d04f071fae70d1c79dbb06d43eed90e8a6d441891c740e27e6df6257af8ac2d37e7939437f9134cbd2798bf1918dc29b0132b1597637dae7fab5db454132e509231443e1e5cedeba1e74bb1e5301cd748e7ebb0d8c1c24b5ab594f62c00483d79f40b264d8785251b8624d0546057d5a5db963836f64a52e2a460132ea875dc47b6cf48ba89bef6a3537aa90ac5672a440bca9046b1aaa41f25b2a1ef8d2ab34b47edfb0cdfa575d308d59ed500c6be6c39d02e561abb0598de72a3e392b3f33c3aea19cfdac915f4117160eefb9dfac4ba19db704baea172261a3a02ed3506bcf8fefb4df4e346c3f30a9545718f83b95cc9fe0b2fec7442957464f6dc9f763bef1a2ad23d355b99617f3e99e8fa7bea2843ef06d93374681c1e9e81c6639c98461f3714d1ba24ba2643c3adf644e0a2f0005d5feb2132be113e79612e2c2c006c688c774d537b10dd067b88b7b301cdfc11eee2da1b46ed224cdd536a945295de349f5e16b424a32aba516a609e3a5f318eff318a5747204af01b9ba3adba0d7d5d28f6fcc07b57089a992d3da375c9abc6165d5de8ca9b9e2e56a1c83647efec9da34d68bdcb5ec450f33070fef500a3442c65c8cab8808afc8085ca5512c25fde9e7f7bce5aaf00634fcc42da9cfe916f3cdcdaf2388b56b02b813f66d3e9b27940fd8dd97c5e86d422f7b7474c7c4bb652eb49024357c0ceb297439432426b12ee5cfd707333b0d6e2c66a94f00fd716b548247a9024bc495515181bea974d9848d81278172618ccdb31b71186cf2a09497d19b9107e8e5ae8e3fc0a359bdc746d68271e77c863a27f79e6720cb16507634a234c36b08b39fc2ad3790005bd6d0cd5eff794229e9090cb2d781fc0d9f7c5679ff93391994f344a168dd621f2c5c6f945d7156fb909093378cd5dcd3893f48b73ab3f26b4bdefac5b8d35a70de9e4724a4989b1e64f1486be9f7f2fda9c75640fb41781f3ba7cf379ad78e90bc992b3eaede63fa55b51e0dda0fbed59971594caceb1ff101391f8411f2253ced929c69bd1968c0600bbf0e96aaadfb443c0f1a832f9a11127c4b0226a92946a46c23290bed64c2c5fa3b25e01016c129a680818020952a553b974795dd12af9f1e590113a6fa2961c3850b212dfa4b028099387b4eb3e4153cec967bece7ece26563d615f7d0389249f5a7280c39264da809d549c600c3cc7985b195daefccb8fdaa1807ee6972fcad2e4244e642849ad74e609635fb1413d12562fc91065df110b9622c3b359d55dfd2a8ef730c7224f24b11a789526ad326b3860a4cdca35c40a41dfefbb1c2c2f46a65f5d5b32b9fccbbf8d9137acfec4a37e1b10355e6379fa8c193357413c4425dd91b30da9780bfb1d0b320e312fc0f7f58d97ad794a828d11554525b999a940ce9bb6e8cd19e53687ae666c34ba5da183273159977c579029ae7490bdf2045834af176a35d896ac8afd493f6149ace46e0870c4604bb01ae4d772b20ab5f51ffb4e165c629a36cdc08349c6c553c29e77b786fc921ef125966d03127112644b8510b33b1a342111a040a4b63ed23bbbe2eea4c22fa452377d0ec8d011e21f8e02f0096c851381d7ff1b11a3a2e184dfea000fe6b1c19186875f208a787d1c6fca68b5993b6e298e2550324241b3bd40fa34c4920c3b90b84cd09240f9c92dab52aa6d5532d1990f2d8e159f4755285a191f606219a0c5d1bbb622b4d53d8e90d0f73bd10f5629e199854cc5f191708f3b6a68d5ff6f3e0440f420a1c73a38f46fc2eb64e60c3e0d01bd946bd97788559c5cd15df5b6fe5781d138175384cfe36023a7603333f2bca0ddc6f683786ff7d1e2270175ff6a499678e388e5bc9a8cc20e035e1ef86045e4b28872c21d47ee611b70692b3bc4fc699119d5cdc60eb388e26265b0d5dfe2cec966a52399d6156ef0a248a560f753a15f16f1e39d75ed19e4f010d4ca0d5b4f80171a76659c930860c1346676f812e9398bb33abf19d592fde0b396d9cb240d3b4a5fcbcc4ce6d68936336761c567ef84ce35cb655217b37af856f7e7bc2d0de8309e7dc16188c4af596a21c1ab3a8fac74adcf12280d7f688389abc614abda1e16d3f5124fe5bf9908a0b12062c0035c38a69a4f8e9b1d339a2ff74f94f01fb889474ffaa67055148fb599ab1680edf178b19709bd2eb5f9b70417f282bee51308e51618274dff715805c3ad2d7ed6d3340832c89d4c8985efd07980fa8855c88714b7a6b48f1a59bb7ca8a085729a29d8420c6b5e168a17033e8210724babcffe4e902a6791dbb93bf9e1086508914259239827f10bc4855ad8213c0d82", 0x1000}, {&(0x7f0000000340)="773a8f82e3f58aa8505b85e5f132c23221d06b8498e21ebd23ce9d44b99532005107fc5d908c18f972d288ff6291114dbb713017d2f68ac45067887366a7943a0c0806213406573c28fb4a1e3a3bd5b942819d4f6478ce1cde7da399aa56a04f168e54f2120d8e4e354a3d4c9b0afba88f5112811a4e7433430fdaaf8710369e7a59589089d0e2c6a76b8808e0c0b1f982107ca5f81bc26ac18732ba430f03", 0x9f}, {&(0x7f0000000000)="c063d74e155c", 0x6}, {&(0x7f0000000400)="c43d7508c8dd22a5a8f8453a42685cec8ec60423992699a257d8b7f15aef40b7853b7c766a4e4ff09b245106bda288e7ae872f2e94b1b994c1fb725b75f9f48168f31ce4e751d25f0ec8b582196f2cd4c505e55738dd9b071fc3edeb87d0d78c85a3fa34738534d51c44f2f9e8c648bccbc9a4ba35f53f175ae5b35387e95f9299ad4aaf08ce1715b0e573ef7eaa47b26acd2bf8b67154484585c299d26ab15fdc15c5bd861daa7df43a19f66811f208a56eba53f02fa71d3057c53a03835576b582e4e15489d6a7298410ed42e50f16615ad7555b745b9ef857a384", 0xdc}, {&(0x7f0000000500)="d5419f0bdf6c6ae0ac704303c838bd8e27b515c9f150774471056aa7752c8b83326c4af083b060d22fcde23fd29f0896b9889e5b8bdcbef0728a68924ddbf388beac92233dc93475283d750c5221523ed4a7a4f406bdba48f561f038e0bc574d9e689b78a8df2cbb76c376f52a5f8ceb763f4e0724c9fd6afaad0d390e88dd1c59529bd91a5f6aa53954a948dcbc0051d214db6c81492b2be864379dae759067ce2e66f3", 0xa4}, {&(0x7f00000005c0)="609e2ee4fdb6910af9d1de457c48fd98f87fa78b9faee860b3adbafb10841b4f994653090b1d71f3a6bee12d006535c0ad2c61eac4c147c497d7fad831ed75c19b", 0x41}], 0x7, 0x0, 0x0, 0x805}, {&(0x7f00000006c0)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f00000007c0)=[{&(0x7f0000000740)="cca47270efe168d50f23173be93446eb", 0x10}, {&(0x7f0000000780)="e1", 0x1}, {&(0x7f0000001a00)="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", 0x1000}], 0x3}, {&(0x7f0000000800)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000940)=[{&(0x7f0000000880)="6298b3df3a60ce0bb243d7bdcd6befe723f8d6e2d5e304d70b125d0ea1b974ba4d5ae9645cecfbb7102f118c82241624af141aee42ef9ef2c5b6767ee9ea65d7577eca583d3f4d80d9f01cb1cb74ed8cb188396aa9f06056f7d2bc37ff661aa8d61826471cb49d004f9cf75b66344d36599eced6c7f948b34604ed3f29bc12b69284b1b8fdd8b87eeb870de425f66481ce6bbcf97ef00a04072a6bed0aa8214a8ef9da722d82331e5820ba71ab0e0ab94e7d2cbfa03ba7ac8e3e17e9", 0xbc}, {&(0x7f0000002a00)="87c7c41b25618a0bd73bd8024d9252578945e2edb4fafffe87111df76531b854a62a01673999c5a98c6cd27d85eb84738bf518f7a5c4c2484547849f56086e72129e93ffe58c23161cbf4f965a9782da4004a5bc67ef19a2ccae896a5129353b8cf3abeb4c94a0da38399d5d31348d68540eb0ba3df0c18b34e3ea3687d20a8dcdd053c558dd77b673a1468a2b8e8f08a7857cfcd4ef4bb0415e8b1d15dc6cf2dc20ab52160a9c03b6980b02af1cd025b580ac5c64aecc1d0eaca1598f35fb7ffda5beb8aefffdd05ebe5306818dde35fc43c143cb9592987c564d50dfd5591ba3ed4d19bd6a2198f1ead1901bdd963a2648c68c", 0xf4}], 0x2, &(0x7f0000002b00)=[@cred={0x20, 0x1, 0x2, r1, r3, r4}], 0x20, 0x41}, {&(0x7f0000002b40)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000002c00)=[{&(0x7f0000002bc0)="0186", 0x2}], 0x1, &(0x7f0000002d00)=[@cred={0x20, 0x1, 0x2, r1, r5, r6}], 0x20, 0x4000004}, {&(0x7f0000002d40)=@file={0x0, './file1\x00'}, 0x6e, &(0x7f0000006180)=[{&(0x7f0000002dc0)="431c3ecdcc3d5331601779726be304e4889e085622129905db07a45642af8d0ca448386fcc857cd2e37d0e24029a5902a3bc36f1953abcb8654c6a40395c3735be5762853549ea", 0x47}, {&(0x7f0000002e40)="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", 0x1000}, {&(0x7f0000003e40)="1fa09c62e0b855ee7c30940b873832650f9deb2defaa6ba68c273c9c15e38ea3649b32ef8f251ad3297f3b5cd929c8778c52bfedb067558694b4699bbf813b7f78a6c46f9009494d0144e62b", 0x4c}, {&(0x7f0000003ec0)="d07c9aed0044e102185d27e9e812c8e626621edb1c2f1f8acd3244c76c51a776bc8b4ed3b80b388cb3ea1b9652a13cdf685c13275c038a5cc20a24e0d887636deb126071160c7f0aa0d47850a6120e36ad592034bbaec3404c8affd910cf11d904b662219bb04cd28237697712a64994ef9fe1b008064b17eead68ede276e11cc090f0f862fd0f3a33c2ee1da33871d382b3251aa97b395dcc0968d75e88714b017a531fd7ba042c92d29d477cc619ddb7ff906ba00800524a90a2daaa08d540d0fb6a48b340b3646d0b8bf318f35f41102b2fe07492285bb4a17bd4c53b45b21dbd", 0xe2}, {&(0x7f0000003fc0)="884974f65607eb1e0503bccfd8d2a9fb798378bbceaf1c481a5f", 0x1a}, {&(0x7f0000004000)="8e626c0a0c", 0x5}, {&(0x7f0000004040)="582b5be35ae2386a529f2e5f344e97e0ea55b71debd885e680c8d9a87b76b8f317559692b36c76dc588784cb7fabbf1fd7defdfad46c9b77370c99eaf687bd5598e97b337627ea3bdee0e714129a61d86135b30d1cbd6ff435898b82eea02638a2258b18fa52cd9f7e84ef4026776e21de11b164a873afaaf4763d7db7d069b97bb6a1a9dffac542b72bdb0f9314e9909738afa249fdb5534ae5f441658762ea5f9b2319d0fe280835f82d8543fcc0e0c9c11b9ddd140bdd1ddd0e2dd1915f4617c594d0e34fa7eedc1d2857b58c01df6bd01a092c83e206ff2d3ddd8882682e144745ebdd59fa1cadd217277c077c7288215b2abb510cbb14a64d4345987ce175c2d233abab2799a2f043245ffa29cf9f63b39416bff2d655808ed8cadbdbbe1d866b9bab8f3c21197058fec34fa0382e742fc05b2af9c99c4538eb2105407488739e7f3554e4423ba69da2344489013bc3409d1546a38529df25c9162af789c249477bf4421f8ecf52b8aa0cbcd26aff0e76338eb7dd1c72378f28cdda6189b831b3ed4411cfc3d2507ac8da7ada8e9a533e0517ca0c25b3ce385a1933e862e03d4abed9f656d6870593b782b11161c46f6b35f3d4b48a29d0a97a57c6342a57dc676431ccb4ed8d25e35a44c03ec733f93b76eca3df98e73e1b3891e94ff0fc0f088cdcaf370720a9a9763b548cd00573d0b736ded34d3c848d1c540ed91aba04e7750872509c26b4af4d958f291fbc1fcaa8747ca792e25531f689cd06b5c2b85712d527eb21b7c913b7347e7c5792e2c2b04dc84d974e33f9a273b9a6a7244c79327c2a02cb7297bfbb64dcd3ef90d18dfd872e5a73a5a8b0a94fd44fe12d97a79a804eb1f625573e5917ae0be2df7a6633537a29a057a9fb3421c5afeabf95a02aa0059436a3f6020ed48dfa3968b52b885adf8806cf6b3b714f97cf73781587b42c0206ea059ae24af57b0c4a98934b667b48eb8c6013888257a8e9b38650886587c174330e1910cff1c5e8123c094010d8e177a864cba29b2aae7ab97dd5a31b70b1e697c3c24dae4d7b79e728acb25289910281ec15ea0efd9d3feb6b288da0b55fe709466909d01915efa3dbd5a2c48a134f6d7935e180def5d640e550f0aef71b6a83b00bade6838bac7285ddc18496b82eea4ef4a79b3a9cac919ed8cda00948e5fa6a665b75a9f02c2ec88077348389e61772bfdb0554e1be49b1620539a9afc8fd64e8cc10a479a3ee45e12bbd5a72240776b3300834f26c28684a1511c2909c4211afa7be84c1fdde5eee56fb5499ce307cdbe22314140183ad063561dc3f22c4ad6c0e70b5d8990b36b8b39dfbd0872fc92a64f975ec04cf93df0f3fa99bd6bbdf18be953e2a13e9c2fd84171d65dde66a9e41deaa534fa044eff78521a7a549f8de937d15043d140dbbdabae57dd79965fb1c67e236de5a24736a8b48e068898680cc6dc00ffe045bd65d81756aea11d9efe361974d3f477f433ad3913e01dd935d8f26411cbc0a3a20c7dc51d7b351c2cb443fd0d37ba9818e699d33cdbf4e93f76ae2f0c66db2056e90047edd95217ef783af84830ae633aff57fa7d4250dcc210c70957d017a697c0a79b55042aa5295df56ddaa2e66a79cf301e54593dbd1896b6586b149ff0b2bfa63da0f27eb750a521a782a69222bd821d226576540c73c974600e70492543a03bd8f37b2c76c5d165e4404bac6a2dd5233ebacc6ac8707847ba781cee349f91362bad23c2e64da4ddf5aed14d37f6327241cb19b81dd6dad156ba48db7566f775165aaae74b53450e314e577b52a947007bceb68dd34484611e3ee8077ee70d9e5d3346dc89d0f022416a9c38555e43ce542e99df92aeabfd5277f607b50bf5312b508e765a836f8b9d5bcd63adfdd3c388e386e77140f7991bb4abaa45533e0f22f364eac647e06687f2fb2d8da930f466466e6dc8a88c89dc57426e6bcd5747f93f7429f42aea2eb666bbee6cb592a019420d4f2b5ff7c63e18a1cb44369218ab9132fe2d07825a5013343e8d8d9cb04abbf099151d180fc0ba45932a2a20ca55b0c6fd700a341ec27be30b5f45a74ac6d573416af396ebbd8e8f3ffa8cd9bada610b43d60b70fb96e14aa372d5f0bd6f256154ddd0b99d2a158cc73c2d55f7cbdebe1185dbf91c12a6c273abe8bd05490876e5be1c4a405bbadf0ae6edd316bd7441b31079941bcfee7bd1357fdaf8281aaef4ce15ba4404e29938582d9fb594a20d008976bc86929771fa46b484575ba5a52e0433bb30ebe12d1e3f6ba9821b665d2d47231775bc799a4de17c0be29d297c0d52c30ebc6777e340daf381585b14e77bfcb6ee95fea04bba529f7a905be94d4d5fdd2d5e4082275f90792367cd9487297bdf93f4c365d339e42ac0754577862c3da3a5b156c6ee5495769dd49e141e08889d581057f158b8ce19722b47981193bf80d14d66a28389932ffd32afdaf0287ab8e8f4c66064e9b9c9bcf80f23aeb85c7cc1c966bb714b56228c2e5e61a418b58302611fd0b7af74be3a885d3232ca954f40691a82efe7c75c148608b434edbb8f823e80a7574938cc1111d189ef1a2398c14e93dcdcb060d6a606a55bdd853272f3bff2e63fd12e9aafd180ae6a1ad764481330eb62f7513e299aa2068cf0714931fc7f336c8fb7766c1550d1e42071cb9435a4a4710934ff0a6925d40605de52f5502703b0389f1ec1e586f4f47a1aa8a4411df4b800c657d0a5e0ea5f97d0cf68baaa0de5d54d643cbc4b447bf86a7378bfa96f00189d1239f368ba625c641e0a3da451e47c0dc66b041b0c81e6b1052724679a5fb48615617b6abbc215ce99af87a41280e03f35c01684ad2a2b88727f271d683bb9204bd258894221cbbfdec721ecaaf9fed8e2d2d6ea5f0ac935cd82c31b5563d1c9a5889039242fa2c4c95e12e50d9e4f3d6e96eb6b7c059fd1427b3fbd0fe741c61286eb82dccdc515a494682fde805f966184052c06a0ab65fc001dd57fad6bfe84826bb03ecfffe6d0706aba035f0ed01e4362a318fc3b1ccb899da75e4e436d9a9d1999a29504aa05e754142075a6790ff73273d4d8c41b9896fa32b03c18663ed4568783f57df0d72f46d88fef0eb54aaf3c4b960853db9bf044abd71c1530f6f65812a861c32b71e9252943bcf1849904c72ce4b7c52f62da61a597a2bf7f8f1ec61902788e9dafab15d4b344a253f0a5cd54a80911e2ebe7f009cb722159629d8dab1bd695fb2c67428ce0a21fd3f0b117d01f6e5f7f65802de8daff8f6566c770fb086783569ddddab4741e31fb4bd0c0285ac7ef339606c4b57887216f2aa136b65ba47058ca47319021f9910b830a961f21851a31e77e0b13a129e672228fe276d02f563e686d2fee8d1f121a390cefade309553f37399aeda9fb265af4a44c26d7f6a7ca9efa1a450ea7870f7ebc6e9378bcb89d7b447b30f0e0e68d2f069c9e416a0b470f4889d072916aa316105504f19edcd248ea60224b87404ceee54132d896899d1d887f880866d39b9d0c4739f6d8d39ebfa79dd9aa5ce1e08ef22aab22ea861814c2f16565d031de3164a5bb0d7c932741f0b90a9cb40b0a24a696a7b44fd9e14ba691fdefa0cf85962ee8d22704410973dc00a18d093f321de429d2327bc27d7993347fcd56fd55d07ae27d7cef28987db24575043894475cb73b7bea609678e32daae74658c6572f3135e3d0773cf2c7e16499cbdb19dcedeb93d830fd44e909096aa60daff2c954f97a4171996523c12b8875525ee8c792c94603cd95ce1e9d4a2e987be93894f1d00fc82c77d7fa35dea72a2c506da9966a3f4b514dd25d31d37459b1407748013432a33efcc007471d2df98dee8fef2571d093c4e185bd52a3a473814a575e8041886a2f13a35526bb2fddd65bd47e38b695e9cefb72e97613cbbe4f50c5e1d7c1660f73f6f61eaf0ef5b1a17e4670a297fc29a08b7d6a5688c948f99b7955a960e22cb0081b65d19052691a04d1b68bee318143ea3fb2f2a905545e8e8dc836d5110e8a079b3547eb48cc128cd68c749683e4f60b8cd8339396f8b9b68c84fd1a1bd3750c538260d327765967b238f4bcdc41ca7672595a1a7e553bebbf1a9e05cbb336906cba7926e235959d156990c5e482a8f4eff2f1abd00c83844a349862e190dbacc96425520f971fad48634628965b6cacc0a231677ec913bd6bf0b42c7960c06b7fb9db3cf7157397c299d7f3ab02c2952b3864670bab18aff8b8ec051fc39d1a10bcf6ed914e7eb7a55bf2cc686060d6de424f40f03e755d5b433aa75a1ea67798fe3df154cc9f35ddf4f8745fb7698f3e056738ef78430c115c81079cfdc88d6db644c6bb04c039d8583afa93cab349a538ee51185adfeda07eb2c318385a2778ef6a8072afa1407f1cba618043f9101faff84950aeac545b07f11a4191618932cec8fcae23bcc4b0b12b83c1c0134eed9f2902c1171718fd4857dd9ef3560b7fe6356abc0b5e6b1dccfeb7d7fe2ef91de64dad96af9c92e2e5d473435171c19d6da53710e43517dba6fbc3dedc016225bc81d03945ffe60477947c1c76d2999f989396013aa43d9a49dc47f4ba5e155478b335d304c56661178352351cac27b8fc53fcec6e0a01679b722218ed596b38be0715761d27a74c972bf28494e848c11410f66b1c8ee2f6e1bd79e2bb5c78d4cac1a24b160d067ddf293b179ea42986852295227d56c2eb46de51ab61df4e3ab069f93a3c5f279868a9c364c2de669edbe40e2eeea6a46bd93558bcd733dd00ff03363ec1f0773246de2060f43aff3ebeaefdfaf21ce2c4fdaffd33f21cdef38957924597cf261a6a121da081d83ea4cf3f7b7bdb2bf8df7936995ed2ed85ce728f3abf1a89dc3344921fc651f5ba2e55c18679b93c631f578c5868496cfe99c0f14c3fda9ac1acc8c117a753e854e4968fb94682bda21ef93470cdd6ed44f2e9a301eb3d265348284f97fb2b5acacfdd9f957b7891dac001ed77d4de118c2aba9833f97ff24446000e63c2f49a22cf6e0016ac95ba700a82cfb25df131a8eaf28b8fcf8ec9eae3ab1e26dab326dc22a007c8c7bebddfa055c2d44dea33df61fafc3e304b1d5f8bd75bee15488bf00b219dfb37b8e404838b351233c599bca8ee1cd43ca44c01f796708f77535edccb3ee057f2cdf7ce6c2acb3dd7ca7378f495e79e664dfe3e4f56054ceafc8f8a953850129715d1a78e5564b5e863cb7d67832047d64bc8cc77924c4ed1b8fa667528f301ea505af8e8fdb61253bf62155a26af1235160d877b1071ddf9c9c29fcd52cd9f6fec9f5b72d84c92d7caa2d5e41d9950c06dabaafa66d6c37423e26d3b28546f0d39a8341046d017961a1468a11d7b3645080b84c0947520c946afaef9dff1a9183e97ddfb31d3dd4fc466bfdf513e395c9c7bcee7af0eec39209ac1417e988cca63cc5424bff302e138c87b44d5e5dacd8d152ee733a7f7f0ea11ecdbb5e7d89c3a5c84fb0e0974db7ea3c4ae123714086f5030abaf8db9a71c0e5ad0b9d487e0cb8742f3a500533ac3cc33a79ce13b7dffd465ad9565d2cc8bf409fe172b1a0bbd00e9851db7a0aeba4aba4aff218a5ef64d6a003818c978b6ca6a494b914f368ce02495aceaf91605860b65885f21c3dac78d4fc71e17169ebe90c409149a045208d2851b0da5d01698b61924e503372f12b9c594e5fd14aff947952399053bfc567b1430f0259651a9a0dfca6303899715eb88b26696699bc442ce6293f4ff717b2adc4cfced6a3645497ffb1c2173b2f03496b", 0x1000}, {&(0x7f0000005040)="128194b565f0a74cc1a4e8ac81c2fccc316759dbae48083c9e0b7148c6457ee2e4bf39848e47b51536f67e520c4ab8cd602763ca763f9e1589e8ea294f961cc6965917322ae28e3a9c2df6ac36b61dbbad8c4f95d5c499416baa66afe01dbdb06519ffed3af55b8ea2bcf84cb7069a3bcf06b55f4ea456b65291c9cb0d10bcce92aba45ebd8ea694342fac0f5354a5c8f02736348662fdde3828ed7cb162c525c74e2414a55e041ffbba933b80af4f5e18a07b", 0xb3}, {&(0x7f0000005100)="77ad8028048288a57f8a25f913dfe69378c2908d6910f2a4ace50e02d60dab56b6f50f4b8ce1d607fc1de90c82ec9c2cc4d63e48ffed93ed4ba55dba12e696d84d91b0d08e64b5e1ae6a73cc612ac4d9a7c0e131e630ce34f2135d3fe0d68efafdae277b548f19eef93e0a573a0b60f538dcd7224c75b5c7bfe0842a494a5c42ac0596ee42879a5f574d375b1600c991d121fe06c79d468d6b190c02560c450e785701591c719c2579afc55aa0667f5e913f7d31ecb2ae104bd03dedce4d4b98a23460f4ab6c863686a9dceed371becc2e1a5c1be079aca55d74b9cff585822fce2c89373967072fee1689d6d442d1cee00997ac5828ccb69572628a889ee3b815e41d42146c92dedc171e593f5da61d5a337e8fc0555d03b06b2ed09dc2d2ff386826662d6d927e3b3851b4a66bc7c04a1fc31295e7af86995d764ac2db728f490282b71dfc5f755eb49046c75277e07892b23df8e0158f3eb0d4ff2ef379150c1ab20dcd3f7f2d053d13f2b9320f1f4dbc748f2d979f1c485f59a56536b2902dd14d35dbd89b1f2e599dc85730749c91a41c489c06576836fab18cf316b18ca90d51024f3362dd407d9aa1b7bcfded5b39fbea059e3398f1ab171e354fae879a304bee79b3f82df32f9076725d9401add82ade46b8b73e04e7d03fb949b15de1b70346442f10c86bf4cdd101206810696b5a80e3701d24eb9ca3d86caa076b104cb4fe5b38458a67fb8c6178c2933e46b7a1168ecb732c19ac1dd4b88e02fcd4adc4475bce661ad24316d32f5b5079936d98d27681c138472c6088e92dcdc59f8247b18e464974ab60ab9b5e673977ae44bc16f29eabaed377540c7a330cef8ef9bab6c08186941a63a9e7df1487f1d79ca71b1ec0e42c12143fe9ff6489c6145d070170039f9c3a326bdc92016377676b1a4d236fc5e7c58b14afafee08c12e4174abad51e806d2aac712b6b8ef594c8b3f37331d6755f19dbd7b7845b7fa9c83b450791f8c2cd7fc03512a9545e764725298642f7bb80d775ad9c1cfa0410643c66c66e1170f8b3c42e74082db827ee0becae48abc7be278f624dd472fe0686ac476f1809697d4b0f6443feb0898ab8d7da0b00a49915ba4e85bafc45b3672a6ac4c821502f9d6f69af145775a301730c8a4c10773c38e8b120c59b18a1fa51da4d2397db0af4ed00335cabbfcaece372f9fd95bfcdfe70eeb3439421f4e5bcc87d083857c87c5f2d09469205067230c887b0c1e8536ff493447a9b214c05afd03d588b13e1f6563c9e555c725d3e5d8709ce8208938fab07c2db70491ac79ea23374982e4239c56d2dc0226ce8154e07f6d8bc2e127b6a7aaf5062fcdfb74fe980c77b24b6d92048f76ae876505b61012e1e7193cd48c31a26888dc2672b9b2a72e70004ea912ab40b209356b32e5238c6373bd494e0a3dc836fdf10f8490cfe20dfe4767fdf97d1aade1db358b196455c91525198843ebce2b93ee73a3c8f67cf754a9373cc1eb1a5ab843c5080f9d84f204395306e0a636533bf7d43ce81a760cd4d1d0dfb85c5c142cc1c2f48a009e884357a29b4bf2a96fdfd1260cfa83358bd81fe664da737063f6cc806606fce2169bf6b19633e3c688226b1d2414e754e34a72395779151c64a3fa2ba82df2d079564ae9864cc5ebb213228cc4562d8affe231943599a64bdb95f07b40f1350016d6f530b89af0624c0f0f165c7a0f9740ef1156fb8b608f890a8d21a5981b1ab6cc5cdf5d81d1ee8fdb374e7a62be1283e586b57606f70d346aec538dded3ffcb9d35e71435275befa012f79a745ace39b45bc41cf8d1507eefec4a5b0fcf07152b659c589ab6f892f398d5d10eceb4cee9a151f085463df8c1d8d5d7161b8fe126cf6245b41cc5dc295985cb4cd609ebd41c48df43238e76d61679531ca6e55b97914db258ae813a5b5ca12a5f4e778f09d9ef774c4136e85be86ad29a7823e69522b14108c2ce1f275103f30cb249642b9ef0878cced50c007d9c3455dd8c16eabe36c8e38c2175162e19d1c6d2c40af707f9375750fab66d0fd05bfb85cd645adf107c4384da841db43fd70c7805839b527df6aa6b85cb6c60763969028aa35e74485545bfa7383b1e4d7ba39cf1a3670b7b44c14ab74357000b3452d35bfaa36fbfaf278325c438fb99cd78010b494d8258846a07035d166e934b7af3c85afb95827ac4a2c656aebde8be5aa8db7fc876d22e5d2a2ca71a599e8ce221b09ce72576de2227aec6d5e74b8e8abe49ffe1757974f0f4cecf12958b6befd9397ca91d6a521c0b5a8c67e59b0923ffb4e3a2fe8e462f735c621690e7ba8eb4188cb4226132621a6dc9d6ce8c32c91770788fcc5e722d231c8763ec5a129091a54e9e7fa4d12ec3221003d4b9844fcbea61e7ba9dee2440a04e36d822a4d1645b086199a2452900bfda88941bcbde3111a6834143eaefb3e7d1519e1a45d4ee8fa17a4ce8b0d971f3a7368a858b21bee6d51698ccc26b61244b3367c77b6e731547ee5091c809adfdca65e3c56262dcd23e2c38a45955735ebab5b43b8a027818e13f7d3af374cc54136d2ccb0d5a1134b76c52910ddb532cd0e3cf6280da755ea8dba7d454ff4bba07df69d3004af4a495229d9b7cd62f5b18b229752a628a89e634c98aae9b4ce36ee1092fffc5be12edd86d3a62246d8a4979b241aad82b15df493e5728fc28054ffbeb62f6884382022d0613e678a0132ea2aca6a24d58f89647f112138ef3ff46e0e8b8a7e8997d796ae75fe7f4bd39f8267d27d62b342781f2346cf69da67bfbabd80381f349f364e15110ee8760e91bc3f267b6440217a6c835834cadbdd30f23559127f71d53ba3f6ad4757fae7df424d2beda69aed4d1934d60af4e8dd73a794d388d4d337e0c4ee788e81804636bd9363fc1e830412d1d3db4e8dd30f87c6ff48b470308fcb333bc73e55efa98c173e3663510e5b5932cb5a7d6cd838b67ef314b061ccb19c5b457ec959eb68f1108eb9e25d4a5ef4804e24cc300fbf494134bf6ed2c6dd3d6688d4df4b69eaafadd7455a9f38d190e835ae8fe05eac3380761719c52b4aade561b6cb55328cf20a89977441738df6a27a4e5350d2766e816ee3a30619757da0cc16603075dc211db6c53a78021162696d53a7cf34f49a1dec1874ad5df18c980807a9c69f909918c939391350bd5a88643847309f429bfe94f2530cdb47aa77327a7b06fca4436fc7d6721b99c6cf139e43b0338a1bf80c8dd570ea6530fbb8b313b85efeedc0e139bf10af1a93be0a6f12db2e9d8deecfff5011ef2f9d6c46e6128a39cc501491a8a395f3692a976001c6c4d5652a1cf4bf96f88f3f7bbcc2bf8771338f1cebfcfb6adb97a321308164620f5429c81f5f5cd4d0002a6e31b80a83ba2365fb6a9484fd6f966444e1253a381c2c10bb21726a882b0bb274585601468c35131baa70769e24b12b15d86862a6f6c010e30ae8a7c9ac139bcce0107c320bb64693f18128c189cbbea7d8ca39670014febcba41b0a6b1966920fee93d0385ee97d99c354206c6075eabf6107d8a977c46f49047cee891cd4b80e03af9929fc131c23cc6c90f27388c64bc299853a36a36f10251eb4244fbb3615d7d999cc30c1729ae5fef0b48243cdd401f0f828d82b6ae987e6161ce453e50d1c31b6e0b412d2f3a1df66ac46200a9f9ff9f1aed5616fd5249facb1307d8a4de9e0d492ecfcd446c6a20ad3d836c7c84e198ba7c5a1102c470c0743faecf83f61ef9e2f39f9a6075a2b348f363143d40158349119d22edb259dd497d90162f782cec788e0bc59cc26fb8ddd939571ba713a08eb3546dd99aad9526fff172c7712de72c00e23901f399928a26e672804d2e4548620b658fd5364087a450a8ec0e61af18b26a0f9e5a81870b45fa77fa192497bcf3d48acb6a024c5bcbf1520c9167d748dfca09390f29ef433a155b32235a794ce37247a0539baa7c1530ae0a05883ff8842936680eb91725ca571d25cacac1315bf800a1379a7853b89625b9655816b9491d134fc761a7aa852f0298e9460b52ae9a93c92ddf1059779fa9bb112c7a1a21d9fa6a5d1a206ce6acde97c87cd1cd8ca8dbb540fa4f9187a2b46835380541197b37d1e3fe2fd1235a328d8e5521d511811d89307502d5381300808426381d82ddfd378f6afd634ce6caad8f79f3b14df335e28171f6a16d18a503de669b11c2427149c6860860ce9312a348d58fe6702aaa4851507e729a4154a43857b20f6bd7f6d0246a33a01e08959a114899cb44c3252100c519b207087ec0501a7b13f206f0353bd0a0711cf7072a74f40ede08e0ad1421a6e38b66c5d23b52af9c84f33a1639217c6d3447c3d886d44eef300d72d5f0a9cf6fd8cc23780c1ef7de471fe3d19cd679913e6b17421bd9e2d2ae259011a397864a4967d0afe2c3d2d8ab23d05cc09fe6de378203f455d4a9801d8468cb0cbc485c75689a1e2c15520994d993d28a053ff587c5b470047744ca82d3c029d050555ffe2651ab145099c32d163eb0579726efc73738bd0a7023411563a9cb4f817a26107b258b994b9cc312710b37a24cb21f3434d98529f57721177bd34535ca870a480f8e2718b242c873761a9b2ffb14a961e5ae8e94c9cba0c39c9eb5b939f1a3a13034381db70db127d70a6fe780b9a2f2eb6e2425d3f0a93e785fd08ad2c107a0628fbe88585c100fc031f2a0adc4310a71d9462f69a7e80e9068c9eb7f71f40184e0bfe6e88357a1aa1d01207230cab5c3342d8130a6b4c22b9aaf3baf22d55d2fbd13d383a12bb2782ed910cd76c9845eb312d34d4d2fcc2d6b70a06c3a62e378300e09ee14920436cac0d9c5c37e26cc75cfd8f6d683559cda450a148d93ae1deb6dd56c9dfe13aff71fe131f7ffd52d38fa845a5bfc61c7ba07de26a7705766e0f3de26ea4d72ef6e041869a1e71ccd49cd44061d6a5fcb5cc088ac9c43a6d6f931ca61fac83a82a3a53933ea682d92420ba56de417da049393cb94fde9d184e63f12caf1d923a199c645243764f0880ae1c797aaceff1b0cfcf169876b000b9072028c7f126b70f9a9a710eb31c6438523075dd832903a7a8a43f11c46cb5bc68d8e772ba753d69748ee55a312121a2a7ad12f824e9c64cf3e11f59bf2d1ce42047dababcaa6c91bdfeb1c4f93e25436e788c7827f24932532fac7b102304a30ee6572d9c2130633a4a21cd97eaab750c6e248cd54af771cbb7a99259c3a5a4481ded0c52d93396e772b83a5bbfeb5600747c83f4c13a3b1aaa7677c3167a5dd1bbe6732f71042148a97c4f4ef025b6b46d877b707d1dbba6ab060b6274fa6db75d2a60fa233f39dd6d5b89214195b46fdb90f2c8d9bfaac73f59e83e89e8f4d566c4f31113e18b4eb3ae274c5210a41e0bf461c074cdd6cd957cf5a47d01613942d545acd400a52bf39a378bb9fd980ba6779ad868e3ec62f642e1b2341546a9de54a265bb8aac59a75589a8e2c79ea6b474a17ff43e29c4072e009545246423831eee0aa15a6d4b6cecb988ede4fe267e87e54ea4306a9a6a2bc13f0066212bf3fd4e7923f6695d5e0bef8bb74099050581d6ad8528bc02f142410db038b6737af65a07efecc884d3dab63eb6f7e77d5b2859587593dd89a264e6902ebbbd9438ae8e3e1c4427cd2782e3100901ab8a068fb86ff148bc2c4e6c227e86732696524ed19bb4e9cac942073deecf3c576b46ca929553f1e38a7eb535c4031f4c92c6a56fd402d931a8da5fd9e6915c779d1b0b83ba2d8e8109301e262cc2c020", 0x1000}, {&(0x7f0000006100)="9938ef6bad1853309a6671529d3679a3aceba889cdadb5bc5f71f82890b5b2c6231d80931e40f635e9648c58360000bd96200504c4e912f73426c0302a8fd3639234b90ddb8d174aa44f9ec5d2809cfecadefc52293c6105626988a7eb1f4f45790b06b3ca040b78dedda338b951a1d181777dca9e0d9c6fcf5c", 0x7a}], 0xa, 0x0, 0x0, 0x880}], 0x5, 0x8000) syz_open_dev$cec(&(0x7f0000006380)='/dev/cec#\x00', 0x3, 0x2) 04:12:42 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0xf5ffffff) 04:12:42 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r1, 0xc02c563a, &(0x7f0000000040)={0xf, {0x52ea, 0xff, 0x1b, 0x1}, {0x8, 0x80000000, 0x8000, 0x6e16}, {0x7, 0x7}}) dup3(r1, r0, 0x0) 04:12:42 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:12:42 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) bind$vsock_dgram(r0, &(0x7f0000000a40), 0x1b5) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) setitimer(0x0, &(0x7f00000006c0)={{0x0, 0x7530}, {0x77359400}}, &(0x7f0000000700)) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x800) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x95c, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000740)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000940)) write$FUSE_POLL(r0, &(0x7f0000000680)={0x18, 0xffffffffffffffda, 0x6, {0x8}}, 0x16) r2 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, &(0x7f00000008c0), &(0x7f0000000840)=0x68) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r3 = syz_open_dev$vcsa(0x0, 0x40, 0x400000) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f0000000600)) getsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f00000007c0), &(0x7f0000000800)=0x10) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) semget$private(0x0, 0x6, 0x400) semget$private(0x0, 0x7, 0x208) r4 = semget(0x1, 0x7, 0x0) semctl$SETALL(r4, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) lremovexattr(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)=@known='trusted.overlay.opaque\x00') 04:12:42 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0x137) getsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000000), &(0x7f0000000180)=0x4) unlink(&(0x7f0000000200)='./file0\x00') r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x8000010000be) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = fcntl$getown(r1, 0x9) ptrace$setopts(0xffffffffffffffff, r2, 0x7, 0x20) r3 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) memfd_create(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 04:12:42 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xfffffffffffffe32) unlink(&(0x7f0000000200)='./file0\x00') r1 = creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unlinkat(r1, &(0x7f0000000000)='./file1/file0\x00', 0x0) r2 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) syz_mount_image$minix(&(0x7f0000000180)='minix\x00', &(0x7f00000001c0)='./file1/file0\x00', 0x6, 0x3, &(0x7f0000000340)=[{&(0x7f0000000240)="dccc8ac1f2e9dc9a600873cdea5c2dabc042d1869907387f8caf0b4fee901151e86be15fba0e05060c8761defaa2ffca294edb6320efa902d7304301c5830af6d6472dcdbf4dd94e476c767db156ccd4bf698304d3fec43965e98f2fe9a27f5103e693547720956c02ad92587f12d5b42ad96ec496f4657921d3807d", 0x7c, 0x3}, {&(0x7f00000002c0)="4679b51415c2460b5512393f7bfd07be819c903809d7fcc995712f97ded632b78ee964c17393735d6f76fa4aad878b29aea44b36dad4938e5ac147a56cc800ceba3e79e10aaf45ffeedf9c64333fae", 0x4f, 0x1}, {&(0x7f0000000a00)="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", 0x1000, 0x9279}], 0x100000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x35) creat(&(0x7f00000000c0)='./file0\x00', 0x0) memfd_create(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) [ 2830.303469] syz-executor.5 invoked oom-killer: gfp_mask=0x6000c0(GFP_KERNEL), nodemask=(null), order=0, oom_score_adj=0 04:12:42 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:12:42 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0xf6ffffff) [ 2830.354337] syz-executor.5 cpuset=syz5 mems_allowed=0-1 [ 2830.383499] CPU: 1 PID: 14665 Comm: syz-executor.5 Not tainted 4.19.37 #5 [ 2830.390476] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2830.399850] Call Trace: [ 2830.402459] dump_stack+0x172/0x1f0 [ 2830.406109] dump_header+0x15e/0x929 [ 2830.409852] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2830.414977] ? ___ratelimit+0x60/0x595 [ 2830.418886] ? do_raw_spin_unlock+0x57/0x270 [ 2830.423319] oom_kill_process.cold+0x10/0x6f5 [ 2830.427852] ? task_will_free_mem+0x139/0x6e0 [ 2830.432376] out_of_memory+0x936/0x12d0 [ 2830.436381] ? lock_downgrade+0x810/0x810 [ 2830.440554] ? oom_killer_disable+0x280/0x280 [ 2830.445072] ? find_held_lock+0x35/0x130 [ 2830.449160] mem_cgroup_out_of_memory+0x1d2/0x240 [ 2830.454024] ? memcg_event_wake+0x230/0x230 [ 2830.458378] ? do_raw_spin_unlock+0x57/0x270 [ 2830.462805] ? _raw_spin_unlock+0x2d/0x50 [ 2830.466990] try_charge+0x1028/0x15b0 [ 2830.470806] ? find_held_lock+0x35/0x130 [ 2830.474902] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2830.479765] ? kasan_check_read+0x11/0x20 [ 2830.483937] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 2830.488823] mem_cgroup_try_charge+0x24d/0x5e0 [ 2830.493452] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 2830.498411] wp_page_copy+0x430/0x16a0 [ 2830.502315] ? follow_pfn+0x2a0/0x2a0 [ 2830.502338] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 2830.502355] ? kasan_check_read+0x11/0x20 [ 2830.502369] ? do_raw_spin_unlock+0x57/0x270 [ 2830.502385] do_wp_page+0x57d/0x10b0 [ 2830.502403] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 2830.528719] ? kasan_check_write+0x14/0x20 [ 2830.532968] ? do_raw_spin_lock+0xc8/0x240 [ 2830.537222] __handle_mm_fault+0x230a/0x3f80 [ 2830.541645] ? vmf_insert_mixed_mkwrite+0x90/0x90 [ 2830.546501] ? find_held_lock+0x35/0x130 [ 2830.550573] ? handle_mm_fault+0x322/0xb30 [ 2830.554846] ? kasan_check_read+0x11/0x20 [ 2830.559016] handle_mm_fault+0x43f/0xb30 [ 2830.563095] __do_page_fault+0x62a/0xe90 [ 2830.567267] ? vmalloc_fault+0x770/0x770 [ 2830.571345] ? trace_hardirqs_off_caller+0x65/0x220 [ 2830.576370] ? trace_hardirqs_on_caller+0x6a/0x220 [ 2830.581311] ? page_fault+0x8/0x30 [ 2830.584883] do_page_fault+0x71/0x581 [ 2830.588700] ? page_fault+0x8/0x30 [ 2830.592252] page_fault+0x1e/0x30 [ 2830.595714] RIP: 0033:0x40f006 [ 2830.598921] Code: 14 64 00 49 8b 89 c8 02 00 00 49 8b 91 c0 02 00 00 48 89 4a 08 49 8b 89 c8 02 00 00 48 89 11 48 c7 05 aa 14 64 00 00 00 00 00 <48> c7 05 87 3e 30 00 90 2e 71 00 31 d2 48 c7 05 72 3e 30 00 90 2e [ 2830.617843] RSP: 002b:00007fff6d937138 EFLAGS: 00010246 [ 2830.623221] RAX: 000000000123cc00 RBX: 00007fff6d937140 RCX: 0000000000a504a0 [ 2830.630496] RDX: 0000000000a504a0 RSI: 0000000000712e90 RDI: 000000000123cc20 [ 2830.637771] RBP: 00007fff6d937180 R08: 0000000000000001 R09: 000000000123c940 [ 2830.645048] R10: 000000000123cc10 R11: 0000000000000202 R12: 0000000000000001 04:12:42 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x153d2735a77976e9) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2f, 0x57}}, &(0x7f0000000000)='syzkaller\x00', 0x1, 0x99, &(0x7f0000000180)=""/153}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="a3375f83dd2586651779c2b1dc11", 0x0, 0x6a9}, 0x28) setsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000000080)=0x2, 0x2) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r1, 0x8905, &(0x7f00000000c0)) 04:12:42 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') r1 = creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x39) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) memfd_create(0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r3, 0xc0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=0x8, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x1ff, 0x9}, 0x0, 0x0, &(0x7f00000001c0)={0x2, 0xa4a, 0xf5c, 0x3}, &(0x7f0000000240)=0x2, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=0x7}}, 0x10) write$FUSE_INIT(r1, &(0x7f00000003c0)={0x50, 0x0, 0x2, {0x7, 0x1d, 0x200, 0x2000, 0x4fa, 0x20, 0xffffffffffffffff, 0x3f}}, 0x50) write(0xffffffffffffffff, 0x0, 0x0) 04:12:43 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) setxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)='trusted.overlay.redirect\x00', &(0x7f00000001c0)='./file0\x00', 0x8, 0x2) unlink(&(0x7f0000000200)='./file0\x00') ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000380)) creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) lstat(&(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$security_capability(r0, &(0x7f0000000240)='security.capability\x00', &(0x7f0000000340)=@v3={0x3000000, [{0x47, 0x7}, {0x8001, 0x40}], r2}, 0x18, 0x1) r3 = memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r3, 0x0) 04:12:43 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 2830.652325] R13: 0000000000000000 R14: 0000000000000000 R15: 00007fff6d9371d0 04:12:43 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0xfeffffff) 04:12:43 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 2830.885555] Task in /syz5 killed as a result of limit of /syz5 [ 2830.895909] memory: usage 307200kB, limit 307200kB, failcnt 356 [ 2830.930703] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2830.957151] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2831.019808] Memory cgroup stats for /syz5: cache:80KB rss:220552KB rss_huge:182272KB shmem:0KB mapped_file:132KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:220616KB inactive_file:0KB active_file:0KB unevictable:0KB 04:12:43 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 2831.153198] Memory cgroup out of memory: Kill process 5537 (syz-executor.5) score 1113 or sacrifice child [ 2831.241856] Killed process 5537 (syz-executor.5) total-vm:72716kB, anon-rss:2216kB, file-rss:35804kB, shmem-rss:0kB 04:12:44 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0x3) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f0000000600)) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:12:44 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0xff000000) 04:12:44 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff9f, 0x0, 0x0, 0xfffffffffffffe94) ioctl$KVM_SET_XCRS(r2, 0x4188aea7, &(0x7f0000000040)={0x1, 0x0, [{0x0, 0x0, 0x7}]}) r3 = syz_open_dev$swradio(&(0x7f0000000140)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_G_STD(0xffffffffffffff9c, 0x80085617, &(0x7f0000000180)=0x0) ioctl$sock_proto_private(r3, 0x89ea, &(0x7f0000000200)="86fd5e40f7656982f87b7f57dbff4d53a4b8def31634f491b6b0690f9fbd6564ae736f0e26d15c56a6a7c37188269fc4d7728ea7863d599655a4c4b0c30a351cedfcd7635c84c502a3b58ace7079e618977b54a72be43f3d751241ed96d7b991d03f83dfb31587b9e9a6a6733bce6757db4b38bab6d32d7d9e33e85d56ecfde58eab0b81a39d1f5b31cee43729dcc2f731e4fb6fae163257fa7c3e257d7cdbc3fec12e9e8cb421f2ecc43be2797ba970ab082eb2980397da648b32472ca28ab7486aa171ce1d5cd0e3b3166fa05fd356c0") ioctl$VIDIOC_S_STD(r3, 0x40085618, &(0x7f00000001c0)=r4) ioctl$sock_netdev_private(r2, 0x89f3, &(0x7f0000000080)="5c9e48b74268eb659dc4741c37af8b56b7b3896e5d5bcee3fb3ca27f11d34bab0c67d7004ead5ad4bc8aa6c52983282bad4603dd7e1685cc750283aee79c9693f2e3fd43ed4dc1a8c748d648e51ed1617c50a2aa3b02c06a446d6f16ed6257cd4a10405a733ed229031caa0ad2f0b5e6518066068664534c143700a302f9bae0d9db43819fae7be63a95910f3244") 04:12:44 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) socket$rds(0x15, 0x5, 0x0) tkill(r1, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r2, 0x0) 04:12:44 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:12:44 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:12:46 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) memfd_create(0x0, 0x1000000000000005) write(0xffffffffffffffff, 0x0, 0x0) 04:12:46 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f0000000600)) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) openat$ipvs(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) 04:12:46 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0xff010000) 04:12:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r1, 0x0, 0xd2, &(0x7f0000000000), 0x3c) dup2(r0, r1) 04:12:46 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:12:46 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$unix(0x1, 0x400040000000001, 0x0) ioctl$TIOCNXCL(r0, 0x540d) bind$unix(r2, &(0x7f0000003000)=@abs={0x1}, 0x8) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) listen(r2, 0x0) connect(r1, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') sendfile(r1, r3, 0x0, 0x800000bf) unlink(&(0x7f0000000200)='./file0\x00') msgget$private(0x0, 0x40) creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r5 = memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r5, 0x0) 04:12:46 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:12:46 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0xff0f0000) [ 2834.079076] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 04:12:46 executing program 4: r0 = socket$caif_seqpacket(0x25, 0x5, 0x1) fremovexattr(r0, &(0x7f0000000080)=@known='user.syz\x00') r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xffffffff}) fsetxattr$trusted_overlay_opaque(r1, &(0x7f0000000040)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) 04:12:46 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000640)='./file0\x00', 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000800)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) pselect6(0x40, &(0x7f00000000c0)={0xffff, 0x5, 0x2, 0x4000, 0x2, 0x7fff, 0x9, 0x3ff}, &(0x7f00000004c0)={0x8, 0x1, 0x2, 0x6d, 0x81, 0x400, 0x1, 0x8}, &(0x7f0000000680)={0x8000000000, 0x0, 0x8, 0x6, 0x6a007794, 0x800, 0x4, 0x800}, &(0x7f00000006c0)={0x0, 0x989680}, &(0x7f0000000740)={&(0x7f0000000700)={0x8}, 0x8}) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f0000000600)) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f00000007c0)=0x7) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:12:46 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0xfffff000) 04:12:46 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 2834.407228] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 04:12:49 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') r1 = creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r1, 0x3) tkill(r2, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) memfd_create(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 04:12:49 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0xffffff7f) 04:12:49 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:12:49 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts-serpent-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000008cc0)=[{{0x0, 0xfffffffffffffe06, &(0x7f0000003a40)=[{&(0x7f00000002c0)=""/4096, 0x1000}], 0x1, 0x0, 0x5c}}], 0x1, 0x0, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r3 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r3) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r4 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r5 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r5, 0x8921, &(0x7f0000000600)) sendmsg(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:12:49 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='f\x00\x00', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) stat(&(0x7f0000000280)='./file0/file1\x00', 0x0) stat(&(0x7f0000000640)='./file0/file0\x00', &(0x7f0000000700)) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) read$FUSE(r0, &(0x7f00000020c0), 0x1177) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000000040)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x0, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x85e7}}}, 0x90) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='numa_maps\x00') ioctl$KVM_S390_VCPU_FAULT(r1, 0x4008ae52, &(0x7f0000000340)=0x2) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f00000002c0)={'security\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) 04:12:49 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xffffffffffffffec) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r1, 0x0) 04:12:49 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:12:49 executing program 4: r0 = creat(&(0x7f0000000400)='./file0\x00', 0x0) getsockopt$sock_int(r0, 0x1, 0x12, &(0x7f00000000c0), &(0x7f0000000100)=0x4) socket$netlink(0x10, 0x3, 0x0) clone(0x5ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0/0.1\t', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="74726b6e733d72606d612c68f73154cf7688e1e8b6acc60783e9d6de8d78b2ae0ee0e50bbf27b0fe26affbd31128eac125f0070d78db8ba03d7c6795620b859cfbcd4d38abb32768543b350fe5987ea38e6a857b8b41d93c099d47e8e94d05162490836f5ede5d30f685152acac75c30e4434ad01c4d4daf0c9d6f555fd95b953cb8c2f4a5b744c18f7883d377fc4176e2b40cad32166a7b1da4ef17e4f8b860"]) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000040)={0x0, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xa}}, {0x2, 0x4e20, @broadcast}, {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x10}}, 0x2, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000000)='veth1_to_bridge\x00', 0x3, 0x1, 0x8}) 04:12:49 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xffffff14) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) vmsplice(r0, &(0x7f00000001c0)=[{&(0x7f0000000240)="a17d1dd799901c6621b29296e91ee1eff216c147ed2b12f2e9e198a644363c02292446632617b223de1b5de68ff62f8a14b3a379e7e2b98793766381747dbc9e3b884c965cb487c759c095b63d6589342fa1ba07fca65f8bd69e1d346f2bfa78f1abf663692d4a47aeb21513b9e1b1025c5774499029b446e06ffa8b15e614085baa875d291317f87bf0e09cb2ab92ffa6747bba29483faf6dee596f9c88b576370c1a5e03622cf00d7833c33cfe2c3c7b7c2597a9fef28a780fc6dc3b179fff2174545f5c4e614ab84a51c5f26ef2c10d6de5ef3e03e1c0533f5e11b479", 0xde}, {&(0x7f0000000180)="d434bd73c505cec51e4aa748aefc38", 0xf}, {&(0x7f0000000340)="96be660647574650b01d6d1371aea72ea0a3726175ee3678b803cd5329ab4e33da360b8845f7d66458ba079f740d330cf63052b76b28eae2563c643c41c612363d984dd8e34e6eeec178c4b03c65a2cbee1d36807f5a1313614c527a0fc878e951f8c63c2eb3780fdb2f496b3cff34ac33e5d9499744283feeb5e6a8c516ff486632c5", 0x83}], 0x3, 0x8) tkill(r1, 0x39) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000500)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r2, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x14, r3, 0x0, 0x70bd27, 0x25dfdbff, {}, ["", "", "", "", ""]}, 0x14}}, 0x8080) r4 = memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x0) write$FUSE_NOTIFY_STORE(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="290000000400000000000000000000000600000000000000ff03000000006054694200000000000000"], 0x29) ioctl$SCSI_IOCTL_PROBE_HOST(r0, 0x5385, &(0x7f0000000400)=ANY=[@ANYBLOB='X\x00'/81]) r5 = syz_open_dev$mouse(&(0x7f0000000480)='/dev/input/mouse#\x00', 0x7, 0x80002) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x13, r4, 0xfffffffffffffffc) write$P9_RSETATTR(r5, &(0x7f0000000600)={0x7, 0x1b, 0x1}, 0x7) [ 2837.436583] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 04:12:49 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0xffffff8c) 04:12:49 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$binder(&(0x7f00000004c0)='/dev/binder#\x00', 0x0, 0x802) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) ioctl$SIOCGIFMTU(0xffffffffffffffff, 0x8921, &(0x7f0000000600)) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) [ 2837.525835] 9pnet_virtio: no channels available for device 127.0/0.1 04:12:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r2 = socket$packet(0x11, 0x200000003, 0x300) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f0000000200)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f00000001c0)={0x0, 0x3}, 0x4) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) sendmmsg(r3, &(0x7f0000001800)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="44fd82d3ebcd732db4a14e9293c883f958974fff58ee9b297ed3c91cf5d054", 0x1f}], 0x1}, 0x10001}, {{&(0x7f0000000140)=@rxrpc=@in4={0x21, 0x2, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x80, &(0x7f00000003c0)=[{&(0x7f00000000c0)="cce82452", 0x4}, {&(0x7f00000018c0)="4bc4f541c1eba6accc6955b1b4c8c113bf5be1eccc30ccaaea46a9f485642ff2f3ee46144343690e8549b65e87ea94235d6fe7bb6d38843351ac00403c8e0be7270272f204f62359703c225f07f419b01eba582a94243a2428afef3f2470ee09e2cfe5a5baedc7313c920260df16742068ab27ff3054ee76e541ed535211f4ccd156586ceb87d1a32c1fca6f756b0a63101c9a278fe79d293f736abc3b34303c75feafa06be0f51aec2bfa", 0xab}, {&(0x7f0000000300)="c66996d214127e3b8a895a0f6d6807e95d49f12daecf094a347f2018170f4282f7062359d90f622afece415a9ed886901a7ec4f45e1cb3a9183f9b59fe671224142dcdfdad99ab128a7815cac5bde2f322e611e716d87e256e09c1a1176b27ceb9ffd126d4deb161693a3c340c3c97a481f34a842a4246dbffcca2c17dc565fe6774aee6fe1656842d673c585494667cd5300a22b9406fdf", 0x98}], 0x3, &(0x7f0000000400)=[{0x60, 0x108, 0x1, "2de2450a97a970e47bd8df2d1d9dd97ab549735f5b6b45634cacc8a4270ee99e37ddd60ebd3eba1d7bb80ca61df70a3f8ab477e302fd57ca4dac7b020f1b7ccc296a95d549f693342c424b000c48e077"}, {0xb0, 0x0, 0x4c2447dd, "8578aa0e9439ea84848472a786f1a7d5d006debafe608452ae1ade7ecb46651a53cf07577896667a18c26ae8335c8f3204a392ae39e9bec03a87044e438fcb52a9f647c8d618f520fbf3a807317d7da032d2bc149291647229cd3d4ba76f9a0fb0ee5cf10c9379537eeb15c05c69aaa1a4cd4554887f00f3fd03bf2e64d4e7a3d9e1e6ada8150ff7f59df6ef5a889ae7f3df0a9fe759276c9da2c4c2b5"}, {0xa8, 0x1, 0x9, "fbb5e5984098ae9d18c4b51cec92efceebb76413c59630a1a141ddf8bb66827a400a46b1ef58d111f7971bfc30b27b21401d4388717b02a2a1c97b66f1fbf7edfb1754a9580b893a87ea361eeebf2e61b92fb932b693343664b12b0238a146216c39ac48e6ccd0865e6c7f545d4fc882011bc01787d3879c65c83d7c2eddeb524efa38f00732d1dd3b32ebaa287342006809a7378cda5d"}], 0x1b8}, 0x76}, {{&(0x7f00000005c0)=@rxrpc=@in6={0x21, 0x4, 0x2, 0x1c, {0xa, 0x4e23, 0x7e, @empty, 0x28}}, 0x80, &(0x7f00000016c0)=[{&(0x7f0000000640)="cd383aa65391cce401dd9d2bfa56c7f87496022402de60b1c5fda655b6b37dcf3557a198b5f5ee6568ce400261522e4f934f9b5d027f9cc8b4f08da44af9e39f81676782a4a83919336cecff811605047686b0acc07d571796dcf0ca44503826f3981f022ed523948b6123fdac5d7a0cac072eb4bdcf786b4501fb4709ff4ea75a9cdc05e27f78d1d49d20326bd7cec86fc8054cf2a2a4dee1874bd10438f8629f9eae8f736154018ba5b88215a57dd87f1095939474ae6c561e8c3b26d7403fd5de9240e02dba5cd27d06e255cf554c51023db3add3ec56aeb7d39209184a5f9cdb64cf255eabafd3bad23ced53a520de8d59082fec15458071b73b221e3b939480ce74497d9f14ec15bfe52e1721ca08abb706edb8ab20b4083516c261d1e0bade7f36819111645558acdf3f7573b85639a5e5278047985cb097171b567329423b56ccdb7f1fce9a71042035af6c0c6cbfb20ff13fb8ea088f5df992fa6a84ef8b460c156b1ffbe4dc30784a44443529b2c783d61578fd75710fcb12bc556fa9a2f7893c58b76c4b50a1e2a0306ceb491e5f921c15a1fda8faa011c9668cb361af61b4ea0b675afacd1a3aa0efef5c756534df3114a331fa460b3afc55afc38a6e6866a48c0bc96887d0085c66f583c7465995e381f735c3c478fdd050e6a9f6aa0ec7ee34be23749d7601f3c2480392526e98068910d6b20c5c185e5a8c5169c4592a8f8e589499ddc17fbd2339fcab1b545610ae45dd901af3aa377d1159ba10dd88e328ea96cadc7c77172a6a781847b9ddd5e98553859412ea00c65c746648fa2f5ee7880e410298cbce2a66805031932b96206657d2823f98ee519d3945a76505a0be24b9c8a6bb585059f3de1bf2b049eb751ce4f98b32e72cc713798ccb4a7c78c57ae1ccb674711e400be8be45fff908d8206c5cd8f5ecdb83d0ed53b0a1043b552ed56995f92128cf6a023a115b21314123fd36ea985f8bd816e2f5956862b454a82f931d43b89876625bcbb92226361df851cb63ceda08aa0d4f20a44c3c155b53ccd2e3f6e4d49e195571fcf6016992139fabc06e7a3aec24e8a240e2e1fa5a8b9b7b6a8e71bedb320c62fe57ee9f3efaafb32618e757fd620fda3d5b3483ca0b185a97fd48798cca635bf8c38a5cd07f984e9e6f8590618907537c16de3b8198590e57d0ff3da5e73a01c0512a1b732c0880f93dbbe90abefb011fa5dca83635536d91676eaf0f1ba6e4fdae52be4cded9c2fdbc7db9213aadbd9a2931dbfcda723ca66b715ca0806ab232b172fcc05ed69163cd8fc8916a4e231412db7828a6bbdd61f82a9b47903dac06c09343f33f3765c68e8c1b92545a8e811e708d503d08da6663e2a3cf0e3f95bc193e782d521ea0a3e95674ede50bfec2425f7eee8943a26d456f0a7496576e7f366851b758fcc673f5c04a61527a05d2b0e10cd1ed0d6dc6fb0f6a29499a4ed62013f69d8c86e187a58bc76e9fbc7aca65fb7bab086336842f744d4c812a5634d33eb67b00cfdcd394ce996036c00d6abfb2bf1bf4f436c4a06347d9651b5ac2141c684c574a656a702e5acaf751fe5aeae1b87408c6e64179fbde230669165575b68bee13c66e603c9fecc168d5b6c285927aa8e3a9b53e75d3a7239a52f57677fe1a60505f064e906b38b814e6b3ac620f5a85cfa0d82a2e9cba2e12bb7fb640a8fbde7f793d1df9e77c3981d5e5120b605168ad07dd201edfe60f706f4d3eca0ae6aa3537930c4e8faab7489a0be0389204f20e1ed4151408977fd6a450febb4a379f5be51c975921f3db61e9070f8371be808cc191c0941d8fb4648c8c61f4e2222fcf23f8052586e7800c3f30b639d4689ecc20a3253f3d0129ca6a769df09c1873fcd4c7055e371f5a9ca1cea270e89a0a47d3b3d2b7696db2b6a7bc046b2944d2bb9fb4a43fda506cc1075c3ca40e77f4e8d3b5f4dc2f098cd6594f56498920b324bbedfe28d0f94032e0a7728af98197066d5d6ba9b52cb625c4ce7a4de262fa41314825c40535312beece0c55b380b3ba5eb6d64ece1120f315a705d67e83878d4f9916e517a6782914da2493e9de3031ed0aa58ca9f697df66d29364caad30416f059a9ed80120bd2d097670a507c01c71ddfe7eaa2f2a22fbcdbd53355262c8a081a2a4dc9901cdf9b862d93472de5b394715c2f46983180eefc7a2c765feb7f288204cb0afe30ff30daad281326037a98a5ce8c956f5c0a2fb49f4b101babc6dc38d7bb42be734c82db8fc6e8aa2b79f410d7469abb5b10a21050bc29ff2060e46a89201cbbf2cbb796de677fa31e02865afb3aa0499070fde7c4f9aac047aca5b5a7fa39da9495123b552c43428165a3f1c73751d7a6b88157ab040758166e241f23a42166277332e8d2c0cfd57ee77f6e8880cdf9a4c85b0e329be00d7fe20c92705a8990971f27091e78ff28b4d74901211c43aade1406950da1ed7f2f6a04e4644786b5f6d96285826df7290daf7ad7a6e46fb9b72b2a481758b06572022c06e6ab6634411d6a730ccadbb2103a1cbb03e5e0aacbc4cb0f90bd413f257995641fc3e2eea59fe20fb28f43012069513a7ff32bf20535c31d8b5b92b6797cbb6d8ec92819e90cc8234dbf9a410d99182d7951233018b85c7e902340ee687d4379a2e68440d9eb919a577ca422bb497cedac622b6304cb81d6e4f08a7ca55d82e8b369b2a11d837c61750b73878241eef9a9881cc6814bfee14516b3831fddd609e5393d0b91c392b85624a4bbd541ab5f85ca7f5cc0933389ab671dfb8f7a21c35c3d879a0a1a8c155f1a0b2e8abb314a5560e356f62c048b91b074216473b73b8e30a056d8d88b2f44a5bb5de5f530bf7fc712f91233b10753a88d9b4c1221c7280a377268a41bef934f53ec0b6d6f90e3d7cd65759b8db7eae4f3449709cb8b1c7e5d734c0977143e2ea0545df623ee2eaf3d50e502b9185c5d52571810b2fb17f01537c4e5dd3a27ebc7948d975c934831cbca39a5e89d66a2e5b6cb05a3427b32f1401fb44e8a01d7512691fcfe9fa8f97eb5d1c8e81bc6cdcc8fa1e3db81b8a7606c5235a63f0f08268de73df3416548c91ebb3d480bbc95172f5e6e8ab6b4ec36801314178ea82db0df0d13fead507ff4882c33e3e3647013d51cb9ac248fa2766218883a01e11b1a3bfe15c52d0dfc77280b0802411f09da52db2060d9448f4b87fc086759a7e503058718758e62e008570f5a3026335bfdd1cc1a146463a12d3a6c452c83c8238e0c72cb70ba57f5f3dc3ab3b24e7b735cd3ce080fdfeb7d6854849c949c20da0db82bd01aec9750292b8742ae84c62b9dcfbe52ea9835b565243a47984b7643865ff692f869df77b9dc62ff3de482d84149a6a99e334eae760ce79428e5683254f5e0e7b0b7386bedbd14eac3df475316769027510e638bd82445b3c89aab09cefcf8f31e4b74e4a965922543219a91cea00aa29b820a9d52b22b736095cb46d624b8768bf417e82c5f487f82b7b1e90c295c408da193d4c0ce73bdde3b6008a2df2e99a75896ab157b3daa5f2f027b97bf8970fe8886c0ad84bb7769775c92816c94ba2a1a515155ccc3faf9ac706b7822d36d225ab79febaa2a9202865ae807d31367699a2ed2fdfdddafdec7fae61f1d76a49edce7ef800df6c6d9016886a1d79f0f525540ded46e809928365ca4fb723be30b992d47a6f2041261e33a817983c4ff125a6f48ae7767eb4eebf403eed272186a206406ea12707edec133e6b45ca7063a821b0c13eb98655c03ca6b86ec0fbc62cd2585df29c69c0ef20df7a7647cc4158fada0eccd370edc14e80d50e71dabee263b9a1c7e5b7f5f7b0d52364c375735d3c3c6678c580400c738a10da12a6bb9073709284c1396f9849f031fae164ae0269b129a92875bd994f92c9844b2fa1b500ff71777a0d3e95e2728f98efd8cc263c14fdf58c20383161c73b1efcb1f70df0697e168e0eb7991da313a7536d21a72dabc2807ee0e8577067ebd248cbf9be94c9545167617b1bfe305120d234bc19cd96f178b160917e80b42d97d080fd896d48c56d076f7e2d01b5faa829aa1617e79359ea65c3448a53f3853459dd95375fb9c831abc947f170f7200619de2c2b21667e324d622cd5a4480ca8254a6e625ff735098882d017cedd813b2bc1aa90a2d5eb1667c7510c51dabc765b7575c4b4512c51704cf4a52687e5d578a1615bdade5667f6d8953e2435e9bdcf5c59a848239c34f2070f969099d96ee98eb12e16314c63d36d77630e7a589afc5674953b27336d0565fe674aec8298137d1359044a96ca99cf40573ffe5c8f421890edd011401fadc22994e6cf2987a66571398b732f729d863932b8ae65a86c5c473ae579b7a9bc5cc39e58fa94debbe24182294521072b0d536b42b8ac49b8e21c4485d76e3c3028f80647a9caf7e37222a39f83a591acb60a4633b93728dffbd0c291e54dfc9485eca938d470b66acf7738248f98a60ba9b6c69fd2e8f87062cbfbaa19675e9fbbf3425d0f6685981a70c36f4d3d1e121a0636e11e95a5f95c7a3c641c440c578ee685b46972f8c54c9b1bb93e38a3d0253ab3e565740df7fe43679c49807d6fe3c5a97d907ab42d32047a580a6256bb47c84c3c4807996ab0bb84877324e9cc935d974388f19f673daf6f6f4af306ddf2274de820fbf373d2607712a5117c818fc6f02d62622005b576cd29368a06a0edcf9d1ef6a93b2d61f5e4a91df7f0ac0d1f8223e9a9460c1b5eb1ec0e23e01e79f61331217fe00d5d9841829abc9c156aa336ded2509b218408585983cdfb5d685a59cd83c8c7a9da7f120d1d99339f645027e946618b9500a3fe6d5366ccdc7ddd5c1123a6b882648e0b0178e0ff0887c4b5f7f0f2ba2c2d7c98919b9218be303a73f68aa6360596a4de0b34ba448d914708ebdcc6be50107362cfbe07a9d09c1839783a9ecbd65b83fbd48270e46d1717abaa066b8deb242a65ce1b7bcee09bb86af289389fff9c9464718e14ead98b5f9729be83335b14405d59738a8bb01e9fae71fffe4c15dd0263c09c9b6453d2974dd4cdf67395d42e3a56690d075417ceeb26161f317d5e5ebff0c66a7c0eaf845f36f86593cadf900c16f681ca5e23702dfd7b84a59d80b09ad81f7b29451de14100b3ba925e21b79c8b1965566c55c2e2343a6292b4b271d86a9aa37abd86fd4028f70a6e2d1a130b863c9036b9d89708d64eefcde7dc3b887825fc2228a01c3557a501629bc3e7b75123800b0d5bf2076da33aab9c4872027000d8c240b637821dc18189a927394361b0c566fb97d77ac12304a5b920d204481dba9c2fbc46500ee8f1099a4e93a88a6d287c8d23deb67e93ffdcf0b71fd47f35791b8ad3dd1679580ed1ba6f5f04b2afac2704dfc140b5bf637d8fd651a57a9e7fe21996a45418e3f8c499b0f8bca2f8406c898e857db248daed72d93ccb83d7e77ceb1ac14b7ba0cb4d6481d8b7c9521c25c4d7fcc1a73d92cf438563177f3adf4e5ebbbab3b5ee1aece34cf020e4cc26591b6c6ac961fba72e65be99ca429d95e7e63346ef45975b67482b7f9b0ff4a043688c231b36d23337cf23febd297e2d3d44d95bbaf27f94fbe9468d27969b051b9c1fb34e57d6860fc0340469520ec09576b192d1dabd3e5c30a5a1cc853efb352a9b100505e5892a64283a4661fae365cb4bbfc1c122ae99a65c1f4057aeea971a0c195774b4a1736d295a95206a6d300352d8d5a7714e2b096d50b16f114d384bc447d4a0208f14675f4d6b386cf439b84ce7", 0x1000}, {&(0x7f0000001640)="7db38d0338206482474f7e31d01c8fb6aece1f1dabcd3e12dcad84a03930841ed6c6119c3e0be6ffa6c717a384b3d4b43fcaeaf9e64a45dd3cf6b1236e26802b71ede483e2bd8b09c68f6dfe6a2cb3b43b30c9e6b0b0bc80317a2cb3ba3e97576f3c0394f8ef334fa4eaffb41e6c0664c9d8c6a6ea70627971aef3ed", 0x7c}], 0x2, &(0x7f0000001700)=[{0xc8, 0x117, 0x3ff, "0759357725317c99e0664712c44b387d60b3011169e53077d19083b8642ceb3893c70b3c50f30ea27e0b6628b9b9bc27db38fc0f54b6457834c183f2319d3e6253950fb0f09676e1e5976554d11337364270fd75163d3754e1acb9a1767a8cf6594679e21cea747b6fc0b147d38eef8246649522a9383ca1a3ae1bfed3efd190c7a9d1212237d45f08803e1f1f770cc582de0580bf491db3c5353b678f6ad06257b8c383fac77d3170bd40601a309bf5b9fd0ce3"}], 0xc8}, 0x1}], 0x3, 0x0) [ 2837.579639] 9pnet_virtio: no channels available for device 127.0/0.1 [ 2837.778162] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 04:12:50 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000140)='./file0\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() lsetxattr$security_selinux(&(0x7f0000000000)='./file1\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x2) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) memfd_create(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 04:12:50 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:12:50 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0xffffffa1) 04:12:50 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f0000000600)) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) ioctl$sock_SIOCBRDELBR(r3, 0x89a1, &(0x7f00000004c0)='veth1_to_bridge\x00') mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:12:50 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, &(0x7f0000000000)={'ipvs\x00'}, &(0x7f0000000040)=0x1e) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/status\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SYNC(r1, 0x4) sendmmsg(r0, &(0x7f0000001c40)=[{{&(0x7f0000000100)=@in={0x2, 0x4e20, @empty}, 0x80, 0x0}}], 0x400000000000105, 0x0) 04:12:50 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0xffffffe0) 04:12:50 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 2838.543874] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 04:12:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000000)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) getsockopt(r1, 0x6, 0xfffffffffffffffc, &(0x7f0000000080)=""/195, &(0x7f0000000180)=0xc3) r2 = dup(r0) ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000200)={0x5, 0x0, 0x2, 0xfffffffffffffffb, 0x8, 0x8}) setsockopt$packet_int(r1, 0x107, 0xc, &(0x7f0000000040), 0x4) write$P9_RLINK(r2, &(0x7f0000000240)={0x7, 0x47, 0x2}, 0x7) ioctl$SIOCX25GFACILITIES(r0, 0x89e2, &(0x7f00000001c0)) [ 2839.528002] protocol 88fb is buggy, dev hsr_slave_0 [ 2839.533186] protocol 88fb is buggy, dev hsr_slave_1 [ 2839.538458] protocol 88fb is buggy, dev hsr_slave_0 [ 2839.543612] protocol 88fb is buggy, dev hsr_slave_1 [ 2839.548781] protocol 88fb is buggy, dev hsr_slave_0 [ 2839.554005] protocol 88fb is buggy, dev hsr_slave_1 [ 2839.793775] protocol 88fb is buggy, dev hsr_slave_0 [ 2839.798940] protocol 88fb is buggy, dev hsr_slave_1 [ 2839.804101] protocol 88fb is buggy, dev hsr_slave_0 [ 2839.809238] protocol 88fb is buggy, dev hsr_slave_1 04:12:52 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) truncate(&(0x7f0000000000)='./file1\x00', 0x10000) ptrace$setopts(0x4206, r1, 0x0, 0x100006) tkill(r1, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r2, 0x0) 04:12:52 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:12:52 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0xffffffe4) 04:12:52 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000004c0)={0x0, 0x7, 0x4, 0x5}, &(0x7f0000000640)=0x10) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000680)=@sack_info={r3, 0x200, 0x8}, &(0x7f00000006c0)=0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r4, 0x8921, &(0x7f0000000600)) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) r5 = semget(0x2, 0x0, 0x9304e645a796d09c) semctl$SETALL(r5, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:12:52 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x39) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) memfd_create(0x0, 0x0) ioctl$IMCLEAR_L2(r2, 0x80044946, &(0x7f0000000440)=0xfffffffffffffff9) write(0xffffffffffffffff, 0x0, 0x0) recvmsg$kcm(r2, &(0x7f0000000400)={&(0x7f0000000180)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000000)=""/41, 0x29}, {&(0x7f0000000240)=""/146, 0x92}, {&(0x7f0000000300)=""/136, 0x88}], 0x3}, 0x2) 04:12:52 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}], "", [[]]}, 0x158) 04:12:52 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0xfffffff4) 04:12:52 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:12:52 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000540)="11dc86055e0bceec7be070") syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2f, 0x0, @rand_addr, @multicast1}, @icmp=@address_reply={0x2b6}}}}}, 0x0) 04:12:53 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:12:53 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x200000000000039) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r2, 0x0) 04:12:53 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0xfffffff5) 04:12:53 executing program 4: r0 = socket$unix(0x1, 0x2000000000001, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = fcntl$dupfd(r2, 0x0, r3) mount$9p_fd(0x0, &(0x7f0000000340)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000380)='9p\x00', 0x0, &(0x7f0000000040)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r0}}) 04:12:53 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) ioctl$TIOCMBIS(r0, 0x5416, &(0x7f0000000640)=0x1f) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) recvfrom$x25(r1, &(0x7f00000008c0)=""/4096, 0x1000, 0x40010041, &(0x7f00000004c0)={0x9, @null=' \x00'}, 0x12) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r2) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r3 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f00000006c0)={0x3, &(0x7f0000000680)=[{0x8, 0x1, 0x7, 0x8}, {0x4, 0x1ff, 0xd5d0, 0x5260000000}, {0xffffffffffffffc0, 0x9, 0x4, 0x20}]}, 0x10) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r4, 0x8921, &(0x7f0000000600)) sendmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:12:53 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:12:53 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0xfffffff6) [ 2841.520671] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 04:12:55 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x1, 0x261b, 0x8, 0x7, 0x8, 0x0, 0xeac, 0x1, 0x0}, &(0x7f0000000180)=0x20) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000001c0)={r1, 0x2}, &(0x7f0000000240)=0x8) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0xfda6, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) memfd_create(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 04:12:55 executing program 4: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 04:12:55 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:12:55 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0xfffffffe) 04:12:55 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000080), &(0x7f0000000640)=0xc) r2 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f0000000600)) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) getsockopt$bt_rfcomm_RFCOMM_LM(r3, 0x12, 0x3, &(0x7f0000000680), &(0x7f00000006c0)=0x4) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:12:55 executing program 3: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x1ff, 0x7f, 0x400, 0x7, 0x0, 0x8f800000, 0x1000, 0x8, 0x8, 0x7, 0x100000001, 0x3, 0xe46, 0xd7b, 0xfff, 0xc9, 0x3, 0x9, 0x0, 0x80000000, 0x3, 0x6, 0x23e, 0x6, 0x7, 0x8, 0x7, 0x20, 0x1000, 0x0, 0x1ff, 0x7fff, 0xf6, 0x400, 0x1, 0x3, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x10000, 0x80000001, 0x8, 0x7, 0x5, 0x2, 0x100000001}, 0x0, 0x6, r0, 0x2) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r3, 0x0) 04:12:55 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x1000000000000) 04:12:55 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)=0x0) ptrace$getenv(0x4201, r1, 0x5, &(0x7f0000000180)) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) memfd_create(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 04:12:55 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 2844.167228] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 04:12:55 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000004c0)='vbo\x85net1\x00', 0xfffffffffffffffc) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f0000000600)) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) semget$private(0x0, 0x0, 0x20) r4 = semget$private(0x0, 0x0, 0x105) semctl$SETALL(r4, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:12:55 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') setsockopt$rose(r0, 0x104, 0x6, &(0x7f0000000280)=0xdb, 0x4) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000180)={0x1, 0x10000, 0x9, 0x9, 0x19, 0x5, 0x4, 0x2, 0x0, 0x3, 0x5, 0x1}) r1 = creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000000)={0x5}, 0x4) lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x39) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) memfd_create(0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000001c0)=0x10000, 0x4) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}}}, &(0x7f00000003c0)=0xe8) sendmsg$nl_route(r0, &(0x7f0000000480)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[@ANYBLOB="400000001800080027bd7000fedbdf251c3000000000ff14002100f2bd3776c5", @ANYRES32=r4, @ANYBLOB="1400010000000000ff000000000000000020c46308503d522437a56622a7fe002e64dc418476"], 0x40}, 0x1, 0x0, 0x0, 0x40004}, 0x8050) write(0xffffffffffffffff, 0x0, 0x0) 04:12:56 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x10000000000000) 04:12:56 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:12:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x4a, 0x0, 0xffffffffffffff9c}, 0x3c) r1 = perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r0) 04:12:58 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f0000000600)) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000740)='/dev/sequencer2\x00', 0x42100, 0x0) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:12:58 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x20000000000000) 04:12:58 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:12:58 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() lsetxattr$security_selinux(&(0x7f0000000180)='./file1\x00', &(0x7f0000000000)='security.selinux\x00', 0x0, 0xff, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f0000000080)='./file0/file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f00000001c0)="738f8f2e10ea953c7da135d67d5a1264e002d42c59b98e3c8960433fdf60e6e72c82e809947da43e65", 0x29, 0x1f}, {&(0x7f0000000a00)="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", 0x1000, 0x5e1}, {&(0x7f0000000240)="a2fab8657c0d77b3eb150ee27ac5750e3e26683c9d5c42a0217028f9352f5339e81dece2d1e5a23bbd92efeae4e0fa491828ed8c70b6d017258d595209ed078f50d4b2c5dfc8450c8f13541c35f3c652b4e0bb4e5cb0af236c23cde96d3ae15bf2d0fa9d9445a64ed3d887f7c5ce4a410f7327dcbe438105c4098935d55ec7acc87c487194a91fc46c66ac05eae800dd2d8cd3cdb2a0e6cc59de54b2c51ace5b8d14771b03ee061c9ef3833d4c996021b2f6efe7cfbf18d45fb1e62fb39b131335e8b63f638e19aa301887dd77163265706a4c5198b31862862235919824a60deeee42ecffb55151b9d308e60dfb43b407d9f6bad171a0", 0xf7, 0x20}, {&(0x7f0000000340)="9daa80d3da838e79bc4efc7050896367becec423c1e3996281c0dc2afb36254848c9c8e986b8f43a8a736b176ba118215b43d95cd633fd5f6b2e550531f87f9f02f05954d5859880f8615a3fff6b409757fe6cf87b727b9133c856cce857e58f92c8692b67b32c4cc1910c84486c0d47bf98865ab702e30d32a8a91908ec833e9069158d5793f65b1ef843f602d5056f53a73cd458aa85f97fe68835a67ba1bf891f32c682590f0cd3545549e4eeae1a01af85bc72cc0c939c84474b5b8d4fbd67a51124ab8718260288653597370b990c529018536393051eced6aef0859e7000640cb725", 0xe5, 0x7ff}, {&(0x7f0000000440)="4c4f2637a22fcac758975b80851ec05bb97202f64284fa709f06588b68e589c5a7c21a4af81767bc02c0c19b0b70785bea410d560419149efd0f08644a4ab7eb3e8462862458f80fcc7c07ce2e04b174c74f0b393a37ac35048baf799bebd6eb11cdaa46b368b95e73f62fb9118f860863e3921064e806f22666", 0x7a, 0x2}], 0x4000, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 04:12:58 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r2, 0x0) [ 2847.485447] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 04:12:58 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x6b6b6b00000000) 04:12:59 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:12:59 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) creat(&(0x7f0000000000)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)={0x2, 0x15, 0x7fffffff, 0x873a359c847af0e8, 0x24, 0x0, 0x70bd2a, 0x25dfdbff, [@sadb_ident={0x2, 0xb, 0xff, 0x0, 0x3}, @sadb_x_nat_t_type={0x1, 0x14, 0x4}, @sadb_x_nat_t_port={0x1, 0x15, 0x4e24}, @sadb_lifetime={0x4, 0x4, 0x5, 0x3dcd, 0x80000000, 0x7fffffff}, @sadb_x_sa2={0x2, 0x13, 0xbae, 0x0, 0x0, 0x70bd2a}, @sadb_x_policy={0x8, 0x12, 0x4, 0x1, 0x0, 0x0, 0x6, {0x6, 0xff, 0x482, 0x1, 0x0, 0x0, 0x0, @in=@local, @in=@initdev={0xac, 0x1e, 0x1, 0x0}}}, @sadb_x_policy={0x8, 0x12, 0x0, 0x6, 0x0, 0x6e6bba, 0x5, {0x6, 0x7e, 0x0, 0x3, 0x0, 0xc8f8, 0x0, @in6=@dev={0xfe, 0x80, [], 0xf}, @in6=@dev={0xfe, 0x80, [], 0x1a}}}, @sadb_x_policy={0x8, 0x12, 0x4, 0x7, 0x0, 0x6e6bb2, 0xe999, {0x6, 0x2b, 0x4, 0x5, 0x0, 0x2, 0x0, @in=@multicast2, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}}}]}, 0x120}}, 0x4084) r1 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) memfd_create(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 04:12:59 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0xf0ffffffffffff) 04:12:59 executing program 4: lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='security.selinux\x00', &(0x7f00000001c0)='system_u:object_r:crash_device_t:s0\x00', 0x24, 0x2) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[]) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000280)={'syz_tun\x00', {0x2, 0x4e22, @empty}}) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 04:12:59 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:12:59 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0xff070000000000) 04:12:59 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, &(0x7f0000000700)={&(0x7f00000004c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r2, 0x800, 0x70bd2d, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x1c}}, 0x20040000) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r3 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r4, 0x8921, &(0x7f0000000600)) sendmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:12:59 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x20) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') r1 = creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r1, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x34, r3, 0x400, 0x70bd2a, 0x25dfdbfc, {{}, 0x0, 0x4107, 0x0, {0x18, 0x18, {0xfffffffeffffffff, @bearer=@l2={'eth', 0x3a, 'netdevsim0\x00'}}}}, ["", "", "", "", ""]}, 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000000) mknod$loop(&(0x7f0000000180)='./file1\x00', 0x22, 0x0) lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4201, r2, 0x0, 0xfffffffffffffffe) tkill(r2, 0x39) ioctl$PPPIOCSDEBUG(r0, 0x40047440, &(0x7f0000000000)=0x200) getpeername$packet(r0, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000002c0)={@ipv4={[], [], @broadcast}, 0x3c, r4}) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x10100, 0x0) r5 = creat(&(0x7f0000000440)='./file0\x00', 0x183) socket$isdn(0x22, 0x3, 0x23) memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r5, 0x114, 0x7, &(0x7f0000000500)={@ll={0x11, 0xd, r4, 0x1, 0x8, 0x6, @remote}, {&(0x7f0000000480)=""/115, 0x73}, &(0x7f00000000c0), 0x4c}, 0xa0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r1, 0x0) 04:12:59 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:12:59 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x100000000000000) 04:12:59 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x200000000000000) 04:12:59 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @dev}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1800008912, &(0x7f00000001c0)="1098ce66000000007be070") sendto$inet(r0, 0x0, 0xff1b, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000280)="a3", 0x1, 0x8094, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000003c0)='b', 0x1, 0x0, 0x0, 0x0) 04:12:59 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:13:02 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0xfffffffffffffffe, 0xfffffffffffffffc) tkill(r1, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) memfd_create(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 04:13:02 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) futex(&(0x7f0000000740), 0x8b, 0x2, &(0x7f00000007c0)={0x0, 0x1c9c380}, &(0x7f0000000800), 0x2) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) eventfd2(0x7, 0x80000) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000008c0)={0x5, &(0x7f0000000840)=[{0x1, 0x3, 0x9}, {0x81, 0x2a01, 0x6, 0x8}, {0xfff, 0x200, 0x3, 0x3}, {0x0, 0x6, 0x6, 0x8000}, {0x3, 0x0, 0x4, 0xfffffffffffff000}]}, 0x10) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f0000000600)) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) getsockopt$netlink(r3, 0x10e, 0xf, &(0x7f0000000640)=""/172, &(0x7f0000000700)=0xac) syz_genetlink_get_family_id$team(&(0x7f00000004c0)='team\x00') mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:13:02 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') r1 = creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r3, 0x0) fstat(r0, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@empty, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@dev}}, &(0x7f0000001a00)=0xe8) write$cgroup_pid(r0, &(0x7f0000001b40)=r2, 0x12) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000180)='./file0\x00', 0x6, 0xa, &(0x7f0000000740)=[{&(0x7f00000001c0)="89fbcb130b", 0x5, 0x1}, {&(0x7f0000000240)="e9099fa6d6904b5a2882a9f596f9c43c98fecbafd4ad11bf60a332303e80a6665677f274fb0b6b960456f76249b7eaab80af01bb42b39eb67c089e4416703f528e775385726b87dbe04d0e70676d35efe0327e334271d839b5d6a4966e228a2b4000d51d317c83", 0x67, 0x8}, {&(0x7f00000002c0)="872efc15ab4bfeb3fdab158313cc2440298a7416f50bd09e19d7935cadd83660dd541ccda0c295a5841d34097738ea4ce3d1b13effab0a050dd608c6d5c2381b9957a712f6", 0x45, 0x9}, {&(0x7f0000000340)="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", 0xfe, 0x8}, {&(0x7f0000000440)="6f1fd1e86f81d55921d7e1466bbb94e6e440d2f72e4d9c9f74f8a6e83acf21f99c39f9aaa2e147cdc004cfa461aa0a", 0x2f, 0x3}, {&(0x7f0000000480)="aab2ea1806ecb591acf2df9e74743c4b8627f29a647580011545864bfaffca00f01788c54b9c7ced259fc17a66d1cc93128b94c606d0136ba6ac3a817d6268e618eb911e6c471699524672e474fcb54903f806a16ef23a8e87b290c28257491b83e6a5ad6a0cfa55ab77c46da78e492615f7370d9eeb25bfd7b9fabc09535e4f915546bba526796e499267f93c62844692d7282589e85ea82121bd6f589d4a1bafee75ce529b00ef5ad971dcdf5b6fb566731611db785354", 0xb8, 0xc9cf}, {&(0x7f0000000540)="1b045b78804c308f0b278dd948e7bd3fa503d6614ab3ba2b85ca1ce7227f816fa4ebad6bace41e5bfb36ddc7cc667432d1a67e1f9bac761669d9bb3f47656402ca7c088eae8ddba02a800bd96dc581bbb0eec824d12a049af1947b88b14aa7fbf0ab3f77dbdcb341190beaa3ac26b4cc02d383345bb11f0866fa85e64984d10781b433", 0x83, 0x6}, {&(0x7f0000000600)="d7bfd253f036e82f3a33d700911a47e836338cb61b751accbeaa34f28420428ec97a2f4a59e2136169a209fb0c9b033f7ef1e9c6df44934c3e63dbeada52b7b0ab01c3e9b3d20dd298bf7a768468611fb71601d38f3df4c46c208f9d7b52102f78551cb5db0ad1db9de20fcbbfe1594f75260dc4f0690ca0a18cd1b635f85b7af6fb8b64f3997957f2fda391ce797d9462b41a6cb64ec5baf50dd78873110d8d322e1e1c4636c68e6ac8f18f49aa30f880bc5f022b", 0xb5, 0x4}, {&(0x7f0000000a00)="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", 0x1000, 0x7fff}, {&(0x7f00000006c0)="229975f9ebb2d43e4d2c691c6f71befb774710a9a9f300a4723f970a20c5e8cfdd0fa55247e209625706762598196bd79608239456cb9bbf964b06c6d1d3f515d948464238ce3db24bc1021b558ce76c8aeae8fbe8cf114c149219597a59a666a65385f6155ae0022e100b62d01e97e17bed6a232ea4bf8778d0", 0x7a, 0x5}], 0x1000000, &(0x7f0000001a40)={[{@umask={'umask', 0x3d, 0x6}}, {@uid={'uid', 0x3d, r4}}, {@umask={'umask', 0x3d, 0xffffffffffff8001}}], [{@fowner_eq={'fowner', 0x3d, r5}}, {@subj_type={'subj_type', 0x3d, 'threaded\x00'}}, {@smackfstransmute={'smackfstransmute'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'security.selinux\x00'}}, {@seclabel='seclabel'}, {@dont_measure='dont_measure'}]}) 04:13:02 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x300000000000000) 04:13:02 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:13:02 executing program 4: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @rand_addr="0000000000000000000000000200"}, 0x80, 0x0}, 0x200008c4) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000100)) 04:13:02 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x400000000000000) 04:13:02 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) setsockopt$bt_l2cap_L2CAP_CONNINFO(r1, 0x6, 0x2, &(0x7f0000000140)={0x7c08eea6, 0x0, 0x0, 0x3}, 0x6) r2 = syz_open_pts(r1, 0x0) sched_setaffinity(r0, 0xfffffffffffffe6a, &(0x7f00000000c0)=0x2d) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)=0x2) read(r2, 0x0, 0x82) tkill(r0, 0x1004000000016) 04:13:02 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:13:02 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') r1 = creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x80200000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x39) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) io_setup(0xffffffff, &(0x7f0000000000)) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000180)={0x0, r3, 0xfffffffffffffe00, 0x8, 0x9, 0x1}) memfd_create(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 04:13:02 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x500000000000000) 04:13:02 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x39) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x0) ioctl$KDGKBSENT(r2, 0x4b48, &(0x7f0000000000)={0x0, 0x9, 0x7f}) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r3, 0x0) 04:13:02 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:13:02 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000004c0)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x80000, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f0000000600)) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.opaque\x00', &(0x7f00000006c0)='y\x00', 0x2, 0x1) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:13:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") rt_sigprocmask(0x0, &(0x7f00000000c0)={0xfffffffdfffffffd}, 0x0, 0x8) gettid() timer_create(0x0, 0x0, &(0x7f00000002c0)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1}, {0x0, 0xe4c}}, 0x0) r1 = signalfd4(0xffffffffffffffff, &(0x7f00000001c0)={0xfffffffffffffdac}, 0x8, 0x0) read(r1, &(0x7f0000000200)=""/128, 0x80) 04:13:02 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x600000000000000) 04:13:02 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:13:02 executing program 4: r0 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x4000003102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0xd) ptrace$setregs(0xd, r1, 0x0, &(0x7f00000000c0)) ptrace$cont(0x20, r1, 0x1, 0x0) r2 = gettid() tkill(r2, 0x38) 04:13:03 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x700000000000000) 04:13:03 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) alarm(0x8001) tkill(r1, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) memfd_create(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 04:13:03 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:13:03 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f00000004c0)) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:13:03 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0xc00000000000000) [ 2852.226385] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 04:13:05 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x39) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x0) bind$isdn_base(r2, &(0x7f0000000180)={0x22, 0x1, 0x7, 0x1e, 0x2}, 0x6) r4 = shmget$private(0x0, 0x3000, 0x1, &(0x7f0000ffd000/0x3000)=nil) shmctl$SHM_INFO(r4, 0xe, &(0x7f0000000000)=""/64) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r3, 0x0) 04:13:05 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) fstat(0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, &(0x7f0000000b00)={0x0, &(0x7f0000000a40)=[0x0], 0x0, 0x0, 0x0, 0x1}) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f45"], 0x2) 04:13:05 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:13:05 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0xd00000000000000) 04:13:05 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) getsockopt$rose(r0, 0x104, 0x7, &(0x7f00000004c0), &(0x7f0000000640)=0x4) ioctl$SIOCRSGCAUSE(r0, 0x89e0, &(0x7f00000006c0)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r0, 0x110, 0x4, &(0x7f0000000680)=0x2, 0x4) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f0000000600)) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:13:05 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:13:05 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup2(r1, r1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x1, &(0x7f0000000180)=0x2, 0x4) ioctl$VIDIOC_DECODER_CMD(r2, 0xc0485660, &(0x7f00000001c0)={0x2, 0x3, @start={0x2}}) ioctl$RTC_PIE_OFF(r2, 0x7006) getsockopt$ARPT_SO_GET_INFO(r1, 0x0, 0x60, &(0x7f0000000040)={'filter\x00'}, &(0x7f0000000140)=0x44) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") connect$ax25(r0, &(0x7f00000000c0)={{0x3, @netrom, 0x7}, [@null={0x40, 0x40, 0x40, 0x40, 0x40, 0x40, 0x25dfdbfc}, @bcast, @remote, @rose, @netrom, @default, @default]}, 0x48) ioctl$KVM_KVMCLOCK_CTRL(r2, 0xaead) 04:13:05 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0xf28000000000000) [ 2855.003426] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2855.015084] ax25_connect(): syz-executor.4 uses autobind, please contact jreuter@yaina.de [ 2855.079989] ax25_connect(): syz-executor.4 uses autobind, please contact jreuter@yaina.de [ 2855.170844] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 04:13:06 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) fstatfs(r0, &(0x7f0000000240)=""/182) tkill(r1, 0x39) write(0xffffffffffffffff, 0x0, 0x0) 04:13:06 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:13:06 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x1000000000000000) 04:13:06 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f0000000600)) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) ioctl$SIOCX25SCALLUSERDATA(r0, 0x89e5, &(0x7f0000000640)={0x30, "ae4c882c7ae39eaaa48bb36e162b1af69f20f2eb89db773e6ddae85340d0a56c4abe680ca1bbe9b556de3004189c1238515c9111bd10e9f3b94ba3c2f2e657a1c2a56df0ea01d4003c9977097dab6fd36c4121e931f4aed438240ebcbe4c37ba8cbbe56ef1c1a07f2082e99d106728db26cead545c75a62d17eb7767cc01664f"}) [ 2855.493775] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 04:13:08 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x1f) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$sock_SIOCGIFCONF(r2, 0x8912, &(0x7f0000000000)=@buf) r3 = memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r3, 0x0) 04:13:08 executing program 4: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) getsockopt$rose(r0, 0x104, 0x7, &(0x7f00000004c0), &(0x7f0000000640)=0x4) ioctl$SIOCRSGCAUSE(r0, 0x89e0, &(0x7f00000006c0)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r0, 0x110, 0x4, &(0x7f0000000680)=0x2, 0x4) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f0000000600)) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:13:08 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:13:08 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x1200000000000000) 04:13:08 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) inotify_init1(0x80800) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) ioctl$SIOCX25SDTEFACILITIES(r0, 0x89eb, &(0x7f0000000640)={0xcf, 0x5, 0x9, 0x4, 0x4, 0x17, 0x4, "2134685e4e34ffc52834e9c84b8ac8230c20b2c8", "d195c51b75fe2601291791e5e3e3a8be3f0cd12e"}) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) bind$rds(r0, &(0x7f00000004c0)={0x2, 0x4e21, @multicast2}, 0x10) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000000680)=ANY=[@ANYRES32=r0, @ANYBLOB="fd0000009e2a11737191a1a68f843b255a05a1026aab147befa3e89ab12f7000000000"]) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f0000000600)) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f00000006c0)={0x0}) ioctl$DRM_IOCTL_GEM_CLOSE(r0, 0x40086409, &(0x7f0000000700)={r4}) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:13:08 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000480)='./file0\x00') ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)=0x0) ioctl$VHOST_RESET_OWNER(r0, 0xaf02, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='trusted.overlay.upper\x00', &(0x7f0000000500)=ANY=[@ANYBLOB="00fbac04ffdab47ed72c883332497b33b25c210ff8f13b28987fd821d68872b3b4ca975d5986c7701aa33788c38603000000000000006f2520c067c974ee113de770c5ba632c2ea8927b45ca2f865c787ceab22ae60b8e513257be11e795e2483b00d7c5953bb915d2d6035bde8e0ad0a4f7de45c02e640e74924b7eb5273869d4455707b138604d39f461ab4fe738f251d4708f596cf01895f27869da614fcb99a874f843329510bdb6baf30dce5d6c9cc3a7e597"], 0xac, 0x2) syz_init_net_socket$x25(0x9, 0x5, 0x0) waitid(0x2, r1, &(0x7f0000000180), 0x1, &(0x7f0000000240)) write$FUSE_WRITE(r0, &(0x7f0000000380)={0x18, 0x0, 0x3, {0x24}}, 0x18) r2 = creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) ioctl$SIOCX25SENDCALLACCPT(r2, 0x89e9) tkill(r3, 0x39) getresgid(&(0x7f0000000200), &(0x7f0000000440), &(0x7f00000004c0)=0x0) setgid(r4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) memfd_create(0x0, 0x0) r5 = getpgid(r3) sched_getaffinity(r5, 0x8, &(0x7f00000003c0)) write(0xffffffffffffffff, 0x0, 0x0) 04:13:09 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x1500000000000000) [ 2858.214374] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 04:13:09 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:13:09 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000280)='threaded\x00', 0xb0df8f28) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x39) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000000240)={0x200}, 0x1) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) memfd_create(0x0, 0x0) fchmodat(r2, &(0x7f0000000000)='./file1\x00', 0x150) bind(r2, &(0x7f0000000180)=@ax25={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x8}, [@bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x80) write(0xffffffffffffffff, 0x0, 0x0) 04:13:09 executing program 4: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) getsockopt$rose(r0, 0x104, 0x7, &(0x7f00000004c0), &(0x7f0000000640)=0x4) ioctl$SIOCRSGCAUSE(r0, 0x89e0, &(0x7f00000006c0)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r0, 0x110, 0x4, &(0x7f0000000680)=0x2, 0x4) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f0000000600)) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:13:09 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000180)='./file1\x00', 0x2) setsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000000)=0xffffffff, 0x4) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) memfd_create(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 04:13:09 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x1800000000000000) 04:13:09 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0xfffffffffffff800, 0x20000) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000240)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0\x00', 0x8, 0x3) tkill(r1, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000000)=0x8) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r2, 0x0) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f0000000180)={0x9, 0x257b, 0x10000, 0x100, 0x8, 0x8001, 0x0, 0x7, 0x1, 0x70, 0x7f, 0x54}) 04:13:09 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x3ffffffd, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f00000007c0)={0x8000, {{0xa, 0x4e24, 0x80000000, @local, 0x5}}, 0x1, 0x4, [{{0xa, 0x4e23, 0xff, @rand_addr="5e0f61750b7c7263af3d9d640d2d7ba5", 0x3f}}, {{0xa, 0x4e23, 0x1, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, {{0xa, 0x4e20, 0x1ff, @dev={0xfe, 0x80, [], 0x28}, 0x8000}}, {{0xa, 0x4e22, 0x20, @empty, 0x9}}]}, 0x290) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000640)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffa) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f0000000600)) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) request_key(&(0x7f00000004c0)='cifs.spnego\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0xfffffffffffffffd) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:13:09 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:13:09 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x1f00000000000000) [ 2858.836341] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 04:13:09 executing program 4: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) getsockopt$rose(r0, 0x104, 0x7, &(0x7f00000004c0), &(0x7f0000000640)=0x4) ioctl$SIOCRSGCAUSE(r0, 0x89e0, &(0x7f00000006c0)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r0, 0x110, 0x4, &(0x7f0000000680)=0x2, 0x4) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f0000000600)) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:13:09 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:13:09 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) ioctl$TCGETX(r0, 0x5432, &(0x7f0000000100)) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) chmod(&(0x7f00000004c0)='./file0\x00', 0x108) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) bind$rds(r0, &(0x7f0000000640)={0x2, 0x4e22, @local}, 0x10) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r2, 0x8921, &(0x7f0000000600)) sendmsg(r0, &(0x7f0000000700)={0x0, 0x1c5, &(0x7f0000000200)=[{&(0x7f0000000680)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x0, 0x0, 0x382}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:13:09 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x2000000000000000) [ 2859.097975] syz-executor.5 invoked oom-killer: gfp_mask=0x7080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null), order=0, oom_score_adj=1000 04:13:09 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 2859.140483] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 04:13:09 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x2800000000000000) [ 2859.189346] syz-executor.5 cpuset=syz5 mems_allowed=0-1 [ 2859.293962] CPU: 0 PID: 15372 Comm: syz-executor.5 Not tainted 4.19.37 #5 [ 2859.300942] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2859.310350] Call Trace: [ 2859.312992] dump_stack+0x172/0x1f0 [ 2859.316647] dump_header+0x15e/0x929 [ 2859.320395] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2859.325526] ? ___ratelimit+0x60/0x595 [ 2859.329422] ? do_raw_spin_unlock+0x57/0x270 [ 2859.333941] oom_kill_process.cold+0x10/0x6f5 [ 2859.338476] ? task_will_free_mem+0x139/0x6e0 [ 2859.343012] out_of_memory+0x936/0x12d0 [ 2859.347026] ? lock_downgrade+0x810/0x810 [ 2859.351201] ? oom_killer_disable+0x280/0x280 [ 2859.355713] ? find_held_lock+0x35/0x130 [ 2859.359812] mem_cgroup_out_of_memory+0x1d2/0x240 [ 2859.364683] ? memcg_event_wake+0x230/0x230 [ 2859.369033] ? do_raw_spin_unlock+0x57/0x270 [ 2859.373469] ? _raw_spin_unlock+0x2d/0x50 [ 2859.377647] try_charge+0x1028/0x15b0 [ 2859.381474] ? find_held_lock+0x35/0x130 [ 2859.385566] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2859.390427] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 2859.395733] ? find_held_lock+0x35/0x130 [ 2859.399825] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 2859.404723] memcg_kmem_charge_memcg+0x7c/0x130 [ 2859.409708] ? memcg_kmem_put_cache+0xb0/0xb0 [ 2859.414247] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 2859.419124] memcg_kmem_charge+0x136/0x300 [ 2859.423391] __alloc_pages_nodemask+0x3c6/0x760 [ 2859.428086] ? __alloc_pages_slowpath+0x2870/0x2870 [ 2859.433127] ? tun_get+0x171/0x290 [ 2859.436694] ? __lock_acquire+0x6eb/0x48f0 [ 2859.440953] ? __lock_acquire+0x6eb/0x48f0 [ 2859.445224] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2859.450787] alloc_pages_current+0x107/0x210 [ 2859.455236] __pmd_alloc+0x41/0x460 [ 2859.458889] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2859.464450] __handle_mm_fault+0x1959/0x3f80 [ 2859.468896] ? vmf_insert_mixed_mkwrite+0x90/0x90 [ 2859.473766] ? find_held_lock+0x35/0x130 [ 2859.477874] ? handle_mm_fault+0x322/0xb30 [ 2859.482142] ? kasan_check_read+0x11/0x20 [ 2859.486313] handle_mm_fault+0x43f/0xb30 [ 2859.490406] __do_page_fault+0x62a/0xe90 [ 2859.494503] ? vmalloc_fault+0x770/0x770 [ 2859.498591] ? trace_hardirqs_off_caller+0x65/0x220 [ 2859.503631] ? trace_hardirqs_on_caller+0x6a/0x220 [ 2859.508590] ? page_fault+0x8/0x30 [ 2859.512162] do_page_fault+0x71/0x581 [ 2859.515977] ? page_fault+0x8/0x30 [ 2859.519522] page_fault+0x1e/0x30 [ 2859.522990] RIP: 0033:0x401697 [ 2859.526202] Code: 00 00 00 48 83 ec 08 48 8b 15 1d ee 64 00 48 8b 05 0e ee 64 00 48 39 d0 48 8d 8a 00 00 00 01 72 17 48 39 c8 73 12 48 8d 50 04 <89> 38 48 89 15 f0 ed 64 00 48 83 c4 08 c3 48 89 c6 bf 48 8a 4c 00 [ 2859.545303] RSP: 002b:00007fff6d936fd0 EFLAGS: 00010287 [ 2859.550697] RAX: 0000001b2d120000 RBX: 0000000000000000 RCX: 0000001b2e120000 [ 2859.557982] RDX: 0000001b2d120004 RSI: 00007fff6d936d90 RDI: 0000000000000000 [ 2859.565277] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000004 [ 2859.572558] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000001 [ 2859.579884] R13: 00007fff6d9371c0 R14: 0000000000000000 R15: 00007fff6d9371d0 [ 2859.626506] Task in /syz5 killed as a result of limit of /syz5 [ 2859.635330] memory: usage 307200kB, limit 307200kB, failcnt 385 [ 2859.650130] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2859.658044] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2859.668987] Memory cgroup stats for /syz5: cache:80KB rss:219216KB rss_huge:180224KB shmem:0KB mapped_file:132KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:219332KB inactive_file:0KB active_file:4KB unevictable:0KB [ 2859.692059] Memory cgroup out of memory: Kill process 29002 (syz-executor.5) score 1113 or sacrifice child [ 2859.702381] Killed process 29002 (syz-executor.5) total-vm:72584kB, anon-rss:2208kB, file-rss:35808kB, shmem-rss:0kB [ 2859.719541] oom_reaper: reaped process 29002 (syz-executor.5), now anon-rss:0kB, file-rss:34848kB, shmem-rss:0kB 04:13:12 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = memfd_create(0x0, 0x0) write(r2, 0x0, 0x0) 04:13:12 executing program 4: openat$ptmx(0xffffffffffffff9c, 0x0, 0x3ffffffd, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f00000007c0)={0x8000, {{0xa, 0x4e24, 0x80000000, @local, 0x5}}, 0x1, 0x4, [{{0xa, 0x4e23, 0xff, @rand_addr="5e0f61750b7c7263af3d9d640d2d7ba5", 0x3f}}, {{0xa, 0x4e23, 0x1, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, {{0xa, 0x4e20, 0x1ff, @dev={0xfe, 0x80, [], 0x28}, 0x8000}}, {{0xa, 0x4e22, 0x20, @empty, 0x9}}]}, 0x290) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000640)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffa) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f0000000600)) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) request_key(&(0x7f00000004c0)='cifs.spnego\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0xfffffffffffffffd) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:13:12 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000140)='./file1\x00', 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x18) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r2, 0x0) 04:13:12 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x3f00000000000000) 04:13:12 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:13:12 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000640)={'syz', 0x0}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f0000000600)) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:13:12 executing program 4: openat$ptmx(0xffffffffffffff9c, 0x0, 0x3ffffffd, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f00000007c0)={0x8000, {{0xa, 0x4e24, 0x80000000, @local, 0x5}}, 0x1, 0x4, [{{0xa, 0x4e23, 0xff, @rand_addr="5e0f61750b7c7263af3d9d640d2d7ba5", 0x3f}}, {{0xa, 0x4e23, 0x1, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, {{0xa, 0x4e20, 0x1ff, @dev={0xfe, 0x80, [], 0x28}, 0x8000}}, {{0xa, 0x4e22, 0x20, @empty, 0x9}}]}, 0x290) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000640)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffa) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f0000000600)) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) request_key(&(0x7f00000004c0)='cifs.spnego\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0xfffffffffffffffd) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:13:12 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f0000000600)) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) [ 2862.148124] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 04:13:12 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x4000000000000000) 04:13:12 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:13:12 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) write$eventfd(r0, &(0x7f0000000640)=0x2, 0x8) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/self/attr/exec\x00', 0x2, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f0000000600)) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:13:12 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x403e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r4, 0x0) io_setup(0x101, &(0x7f0000000040)) ioctl$ASHMEM_GET_SIZE(r1, 0x7704, 0x0) ioctl$TIOCNOTTY(r0, 0x5422) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, 0x0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r3, 0x4010ae68, &(0x7f0000000380)) fsetxattr(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="6f73786a6264657628746d696d655f747970656367726f75704a70726f63227d635e000100"/48], &(0x7f0000000040)='}eth0\x00', 0xfffffffffffffd07, 0x6) r5 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x200, 0x0) setsockopt$inet6_group_source_req(r5, 0x29, 0x2f, &(0x7f00000001c0)={0x1, {{0xa, 0x4e24, 0x7, @loopback, 0x80000001}}, {{0xa, 0x4e24, 0xb4, @empty, 0x100}}}, 0x108) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f00000000c0), 0x4) [ 2862.504118] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 04:13:13 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4209, r1, 0x0, 0x0) tkill(r1, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) memfd_create(0x0, 0x7) write(0xffffffffffffffff, 0x0, 0x0) 04:13:13 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x8004000000000000) 04:13:15 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') r1 = creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x39) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r4, 0x0) ioctl$KVM_GET_LAPIC(r1, 0x8400ae8e, &(0x7f0000000240)={"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"}) getpeername$netrom(r1, &(0x7f0000000180)={{0x3, @null}, [@null, @default, @netrom, @rose, @default, @null, @null, @netrom]}, &(0x7f0000000640)=0x48) getsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f0000000680)={0x0, 0x1f}, &(0x7f00000006c0)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r3, 0x84, 0x23, &(0x7f0000000700)={r5, 0x4}, 0x8) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x800, 0x0) 04:13:15 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:13:15 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(r0, 0x0, r0, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) ioctl$VIDIOC_S_EDID(r0, 0xc0285629, &(0x7f00000006c0)={0x0, 0x7, 0x9, [], &(0x7f0000000680)=0x80}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) init_module(&(0x7f00000004c0)='vboxnet1\x00', 0x9, &(0x7f0000000640)='cifs.idmap\x00') lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f0000000600)) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1000000000000250}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) 04:13:15 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) write$P9_RRENAME(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r0, 0xc008551a, &(0x7f0000000080)=ANY=[]) removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=@random={'os2.', '/dev/snd/controlC#\x00'}) 04:13:15 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x8028000000000000) 04:13:15 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000040)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() lsetxattr$security_selinux(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000000)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x39) memfd_create(0x0, 0x0) tkill(r1, 0x14) write(0xffffffffffffffff, 0x0, 0x0) 04:13:15 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:13:15 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_SET_KEEPCAPS(0x8, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10100, 0x0) ioctl$TCSBRKP(r1, 0x5425, 0xfffffffffffffffe) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000100)={0x0, 0x81, "542302871523258816efb0e145fc237fa38e9327a21d88e83b475f7dc7d3348dfc35d134d8defd4e5566f3a3c39b6c960c7d94acff1a662f94d53262f908974cb7c0ca48f5ef7ad2b3faa5398624b688ed128ca6979e7ed9ed867fb7d347d5e625d9e39597414ac5bd18fa13690a568455c3930da5f64977f83457c6ea5660ee92"}, &(0x7f0000000080)=0x89) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={r3, 0x392, 0xfd16}, &(0x7f0000000300)=0xc) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r3, 0x5}, &(0x7f0000000200)=0x8) r4 = userfaultfd(0x0) ioctl$UFFDIO_API(r4, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r4, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r5 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x301000, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x7, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f00000000c0)={'i\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="380e9b546c00000100"/44]}) close(r5) 04:13:15 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x8cffffff00000000) 04:13:16 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000000c0)={0xffffffffffffffff}, 0x111, 0x3}}, 0x20) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x88240, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000000180)={0x12, 0x10, 0xfa00, {&(0x7f0000000080), r1, r2}}, 0x18) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="66643d05e695f336b4f5be70246e6ed9f45fdd9ef18156684088de7bbe024e44504af36820928d38c8988d40a5a047877088917fcbd635ab7501dfd1977619b7b0c0a3256dd9e27cf917361b8d4c8a68d956267b0f959d6073e187ac230ab323b7e98a58846acde01b3ffd9461a348a41bafc0a15c9b5bded2c254d007e63fb85eaaa00f52dbe2a336680f084093da6e15408248ec7d73e74c1ea27b322b7b6dc51cee09dacf0895ef74139590d2d266f99a8b7edaf3404ec293f8ff300afc13fd64ed86da9068451411ff72bfa067d533f3afacbd2383f47ad56d39812cd2dbcc4c3484b3a5c703a6926ce12b126f6c162fe2a93907bae9df53c1c5b4e00246ba31a5fb0056b67b932e6e9277dd0f09b0a00483b626cc5901787b0a8e07a7d099358274fd21e1270e2a23bb48146d809c5976b545a7dec74dbff4e330555e5ccae4e0f8ba6e3876a7b40218ee8a9037a9ec3b21adf951a8632366f612bebb", @ANYRESHEX=r3, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303034303030302c757365725f69643deadfcd684a769614843ac6057919fa2297dc31c29363ce6c13b2a4c2ba98ea2f6389679ba079c4c412fd2fd8620ece6911b2bc318bc98f9dea4b38a837a8a524bedfcd8fdc", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r3, &(0x7f00000030c0), 0xffffffb5) write$FUSE_INIT(r3, &(0x7f0000000340)={0x50, 0x0, 0x1, {0x7, 0x1d, 0x0, 0x0, 0x0, 0x3}}, 0x50) 04:13:16 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0xa1ffffff00000000) 04:13:16 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:13:16 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) fcntl$setflags(r0, 0x2, 0x1) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000180)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000140)) tkill(r1, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = memfd_create(&(0x7f00000001c0)='\x00', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r2, 0x0) 04:13:16 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f0000000600)) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:13:16 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0x10000000000000c) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="240000000c0607021dfffd946fa2830020200a0009000600001d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x400, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r1, 0x800442d3, &(0x7f00000000c0)={0xffff, 0x1, 0x0, @random="937cf008ff83", 'veth1_to_bridge\x00'}) 04:13:16 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0xe0ffffffffffffff) 04:13:16 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 2866.014566] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 04:13:16 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) ioctl$TIOCSTI(r0, 0x5412, 0x13) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) memfd_create(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_XEN_HVM_CONFIG(r0, 0x4038ae7a, &(0x7f0000000000)={0x20, 0x40000084, &(0x7f0000000240)="5941abb35bc19dc30e4e20446c95c9ce6a9aac99a5a2fb880438a8dddf15f7a751c03779c7cc4ead891804051def6be91ef46cbc56acf92f9cbecfdb8f90adc31029ccb64f330b09997c34b8565b8b3206408f27b33b3813b7a00ca1cb82dbf5fd735bbc2941f3d11c0c9d3550836ec896b2e23d5fa5de137d6082ee8eaaa9eaf750af73587c89f7ff6b07493982d3100953c94e704e01b3c4227ae38d3f698c7e76f3eea87554dac50f70d90ddfdae62e1a1fbeae5c5c064f62d193d0f029c2fba11bcb26bb7dbf3dc57a2b4c291ad9c43cbe667b32286869653e4df3d4a80667ed48426bb54c87cec1858b8b067143b5476f5fab46204818c07f", &(0x7f0000000340)="ee7cd64a0eb0022b8596786f4484d34e2cfedabde5da0f001c36f24a38116e8dc60b7a390e100f5707261668dc87b6a1c7b2ada7954e7c1c89e68bb2c92f6be5fb1a70f333166d4e5fd79b154a3a0cd251ea930f06b6278a0e28df62b5172503b62e5f08f5f5faa3c09899bef7afe4bf0904cf1db4609abc27d54ef4ef42c37dd70034458e1f116d813519e401015e6a4b0cfb27436b027763dc45ac3412a214c903b89a24bc4b822edc2b2a34e7ecac398009ac95", 0xfb, 0xb5}) 04:13:16 executing program 4: setuid(0xee01) prctl$PR_CAP_AMBIENT(0x1c, 0x0, 0x0) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) recvfrom$llc(r0, &(0x7f0000000040)=""/234, 0xea, 0x40012001, 0x0, 0x0) 04:13:16 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0xe201000000000000) 04:13:16 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f00000004c0)=0xfffffffffffffff9) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f0000000600)) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:13:16 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:13:16 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0xe4ffffff00000000) 04:13:16 executing program 4: r0 = msgget(0x1, 0x200) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000022c0)=0xffffffffffffffff, 0x4) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000)='SEG6\x00') r2 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000002300)='/dev/video2\x00', 0x2, 0x0) dup2(r1, r2) msgsnd(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="03000000000000006d887c2cf2daef5b8b277eb1938d99e7649d0dbc9d64e7bc80e150899e7e42c5a8384477ed2a225390cbbb6c39fae2cc0cff92a9983bd4e5a5fc01bdab8ff339c87d7adc7527be2b84a8d660b6195c71b83aedc5379c9dca08ad2f59ee85e86482ad57bd53c0aa0cfec5f35b3a029a144f42ed7e01de607d4438d89ac465050c55be7b2635fff0b559dcfb426a10fb76429fc534c225f0bd6168acfd392ad1aa2bed7cded75261b02579dc0b992809334cf22ab789893ac167beba5c51d68716a3020f67e40e8c2e67e16b76e903f1d8fc18cd8f0c8f64ae206bcc0e34c59ff37584c74f38237cdc9e494ae6e57aebcd0e4c3b6ad8f09fef74a3982cac5fa47201461d8dd7d13fd364a8aa2a264383537ef21e91701536681afbc28352a475aad03c76b93cab883ed9a62ec7afb410f2fc9391285b1d48805f798e495a58defa527fde7db6c20100000044675b415be43d7e8fe85c1e01f6ca01f012ccf6d96223432fc353c7de5b8438ffeb480aadc43cda84c0e6a055dfc4645b02f521fb971be43536ad7c9350fe50af44d2749f34123aba3ab7bbd3f5f56401ec2d39d60294a0d5d895801c01962c9cb33946cb6741a2eadd2a3fc2632743415fb1d871b00a8418657d3541e2b78c293896e50c13c12315b4c362a6b2a1f0672a03bf6bc3c39d21b7c6a0514710f45bfb1391368d54603349c1"], 0x80, 0x800) r3 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x5, 0x100) ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0x3) [ 2866.576151] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 04:13:19 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0xf4ffffff00000000) 04:13:19 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') r1 = creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) r3 = accept4$ax25(r1, 0x0, &(0x7f0000000000), 0x800) ioctl$sock_ax25_SIOCDELRT(r3, 0x890c, &(0x7f0000000180)={@default, @null, 0x5, [@bcast, @default, @null, @null, @default, @default, @bcast, @bcast]}) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r4, 0x0) 04:13:19 executing program 4: syz_open_dev$video(0x0, 0x0, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x400, 0x800000000002800) openat$full(0xffffffffffffff9c, 0x0, 0x212001, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000380)={r1, 0x10, &(0x7f0000000340)={&(0x7f0000000640)=""/4096, 0x1000}}, 0x10) ioctl$VIDIOC_G_STD(r1, 0x80085617, &(0x7f0000000000)=0x0) ioctl$VIDIOC_S_STD(r1, 0x40085618, &(0x7f00000000c0)=r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$xdp(0x2c, 0x3, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x406, 0x0) r4 = dup2(r3, r0) ioctl$VIDIOC_LOG_STATUS(r4, 0x5646, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) 04:13:19 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:13:19 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x39) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000000)=0x3) creat(&(0x7f00000000c0)='./file0\x00', 0x0) memfd_create(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 04:13:19 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$TIOCGPTLCK(r0, 0x80045439, &(0x7f0000000400)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r2) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r3 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f00000004c0)={0x10001, 0x9}, &(0x7f0000000680)) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r4, 0x8921, &(0x7f0000000600)) sendmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:13:19 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key(&(0x7f0000000bc0)='id_resolver\x00', &(0x7f0000000c00)={'syz', 0x0}, &(0x7f0000000c40)="ca62cfde0ed94466e6bcb8c28b39d229ea5f5e3c9426a182251e4f4e4f7a81c19289581619e1495a36326effff8b2e095bc6f4c2e6ce8e8bc06a002b27826cd05f5134d80ed8d7ca2f2e5feaa175b32d1043bf75abab44078e27b76df1ad508ad6427aecc3e28fff29912668b1acdd4bb354c29d7407553f712f3cedbdb82698df5bb8", 0x83, 0xfffffffffffffffb) request_key(&(0x7f0000000640)='cifs.idmap\x00', &(0x7f0000000d00)={'syz', 0x2}, &(0x7f0000000680)='/\x00', r1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000840)={0x0, 0x5, 0x5, 0x3, 0x9, 0x5}, &(0x7f00000008c0)=0x14) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000d40)=ANY=[@ANYRES32=r2, @ANYBLOB="720000007e569f3487d6fb1e228ddf9d21de5f43afd745b128cfda305656bd7a471492fd4b698dbba5fb901496f154641a07a4b298a7b48462bc613507054d75d95d08c21f392ddf489dbcbae0678861b1d010a3a090637cb9857efb41cbad7189e0ebb076498dd630058ed37c3c127d55143105c2143376aa5edb72fff24f3c09ac277369571df335c6d38d0e2465195f3e3c7100f1e08fe8ae021df654266d01e056a2baf43ecf0f594c601f36329a01aacdfa8c356906ffc9d1ae4fb081889478b5dff46430358403e8fdef3eae32f883adb0ded3ace5910101ac5d3a8199776a123bcd407113a4537a5b66f1b51c701d41372295dd"], &(0x7f0000000980)=0x7a) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_DISABLE(r0, &(0x7f0000000740)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000700)={&(0x7f0000000a00)=ANY=[@ANYBLOB="8c000000", @ANYRES16=r3, @ANYBLOB="10002abd7000ffdbdf2502000000080006000400020040000200040004f7ff0004000800020006000000040004848d77037000080001ffdd000080080001007f0000000800010001000000040004000400040008000100020000001c0aea94080000000000000000000008000100b50900000800010004000000140007000800020000800000080002000105000084327b6caed37cb15ff745f03fcf09844e64a0e4a462ce3b4cb841ff9686a666c1fdde571a846e524051fa4e0395078debbae6f24859c59f1e0fac33fbf3c5d1baf322c4a946f108f9f6675a37dd10c921770ba9c28633c46c86171f827202b88780ec8748de74c802e9e6124e85856c8e6f1dd8c7cb7caa6258c0a845ae5b6cec0defd7884daf43b050727ba540ab85b1a70e34a8ee10284270adf93b86c05ca3b94103110a91d0b13446aac8e819dd05f55ab8ac4255e8bc94a1f6c90ed02de7ab242a13ae2338094f5b1732083418777b648a4b18e1a54097422008c8966cb7a8edc2b77b352303fc9759d2df85f6da298fa289a652f04f805f5dc9b46ec58a0ae8bf3a9200"/417], 0x8c}}, 0x8080) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f00000007c0), &(0x7f0000000800)=0x4) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f00000009c0)={0x2c, @remote, 0x4e24, 0x4, 'ovf\x00', 0x1, 0x1f, 0x19}, 0x2c) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0xfffffce6, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x2, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x45}, 0x0, 0xfffffffffffffffe, r0, 0x200) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r4 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r5 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r5, 0x8921, &(0x7f0000000600)) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x1) sendmsg(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) socket$caif_stream(0x25, 0x1, 0x4) 04:13:19 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video2\x00', 0x2, 0x0) mkdir(0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) getpeername$ax25(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) write$cgroup_pid(r0, &(0x7f0000000180)=r1, 0x12) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r2, &(0x7f0000000240)='.//ile0\x00', r2, &(0x7f00000007c0)='./file0/f.le.\x00') 04:13:19 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0xf5ffffff00000000) 04:13:19 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:13:19 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0xf6ffffff00000000) [ 2869.539833] EXT4-fs warning (device sda1): ext4_group_extend:1769: can't shrink FS - resize aborted 04:13:19 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:13:19 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0xfeffffff00000000) [ 2869.941322] overlayfs: filesystem on './file0' not supported as upperdir 04:13:22 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x4000, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r2, 0x0) 04:13:22 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:13:22 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) gettid() prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f0000000600)) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:13:22 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0xff00000000000000) 04:13:22 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video2\x00', 0x2, 0x0) mkdir(0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) getpeername$ax25(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) write$cgroup_pid(r0, &(0x7f0000000180)=r1, 0x12) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r2, &(0x7f0000000240)='.//ile0\x00', r2, &(0x7f00000007c0)='./file0/f.le.\x00') 04:13:22 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') open(&(0x7f0000000000)='./file1\x00', 0x2000, 0x1cc) creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2a) creat(&(0x7f0000000180)='./file1\x00', 0x0) memfd_create(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 04:13:22 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0xff01000000000000) 04:13:22 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f00000004c0)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x8000000000000003}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f0000000600)) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x8004, 0x1000) 04:13:22 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:13:22 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:13:22 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0xff0f000000000000) 04:13:22 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r2, 0x0) [ 2872.920488] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 04:13:23 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:13:23 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0xffffff7f00000000) 04:13:23 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x401, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x5, 0x100000000000000, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x4e23, 0xfffffffffffffffc, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x9}, 0x1c) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f0000000740)) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) ioctl$TIOCLINUX3(r0, 0x541c, &(0x7f0000000600)) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:13:23 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video2\x00', 0x2, 0x0) mkdir(0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) getpeername$ax25(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) write$cgroup_pid(r0, &(0x7f0000000180)=r1, 0x12) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r2, &(0x7f0000000240)='.//ile0\x00', r2, &(0x7f00000007c0)='./file0/f.le.\x00') 04:13:23 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:13:25 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x3, 0x2) creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) memfd_create(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 04:13:25 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) lsetxattr(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)=@known='com.apple.FinderInfo\x00', &(0x7f00000006c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0xf, 0x2) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af22, &(0x7f0000000700)={0x3, r0}) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f0000000600)) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x4, 0x1000) ioctl$VIDIOC_SUBDEV_S_SELECTION(r3, 0xc040563e, &(0x7f00000004c0)={0x1, 0x0, 0x102, 0x2, {0x7, 0xac, 0xfffffffffffffff8, 0x2}}) 04:13:25 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0xffffffff00000000) 04:13:25 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:13:25 executing program 4: r0 = semget(0xffffffffffffffff, 0x3, 0x0) semop(r0, &(0x7f0000000240), 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") semop(0x0, &(0x7f00000001c0)=[{0x0, 0x0, 0x1000}], 0x1) 04:13:25 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0xfffffffffffff000) [ 2875.950074] syz-executor.5 invoked oom-killer: gfp_mask=0x7080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null), order=3, oom_score_adj=1000 [ 2875.991061] syz-executor.5 cpuset=syz5 mems_allowed=0-1 [ 2875.996983] CPU: 1 PID: 15701 Comm: syz-executor.5 Not tainted 4.19.37 #5 [ 2876.004052] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2876.013421] Call Trace: [ 2876.016060] dump_stack+0x172/0x1f0 [ 2876.019723] dump_header+0x15e/0x929 [ 2876.023461] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2876.028592] ? ___ratelimit+0x60/0x595 [ 2876.032532] ? do_raw_spin_unlock+0x57/0x270 [ 2876.036975] oom_kill_process.cold+0x10/0x6f5 [ 2876.041503] ? task_will_free_mem+0x139/0x6e0 [ 2876.046025] ? find_held_lock+0x35/0x130 [ 2876.050115] out_of_memory+0x936/0x12d0 [ 2876.054117] ? lock_downgrade+0x810/0x810 [ 2876.058310] ? oom_killer_disable+0x280/0x280 [ 2876.062833] ? find_held_lock+0x35/0x130 [ 2876.066932] mem_cgroup_out_of_memory+0x1d2/0x240 [ 2876.071801] ? memcg_event_wake+0x230/0x230 [ 2876.076158] ? do_raw_spin_unlock+0x57/0x270 [ 2876.080604] ? _raw_spin_unlock+0x2d/0x50 [ 2876.084783] try_charge+0x1028/0x15b0 [ 2876.088611] ? find_held_lock+0x35/0x130 [ 2876.092712] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2876.097592] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 2876.102461] ? find_held_lock+0x35/0x130 [ 2876.106552] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 2876.111432] memcg_kmem_charge_memcg+0x7c/0x130 [ 2876.116128] ? memcg_kmem_put_cache+0xb0/0xb0 [ 2876.120651] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 2876.125522] memcg_kmem_charge+0x136/0x300 [ 2876.129786] __alloc_pages_nodemask+0x3c6/0x760 [ 2876.134493] ? __alloc_pages_slowpath+0x2870/0x2870 [ 2876.139544] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2876.144161] ? trace_hardirqs_on+0x67/0x230 [ 2876.148517] copy_process.part.0+0x3e0/0x7970 [ 2876.153053] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2876.158188] ? delayacct_end+0x5c/0x100 [ 2876.162198] ? __delayacct_freepages_end+0xe0/0x140 [ 2876.167254] ? __lock_acquire+0x6eb/0x48f0 [ 2876.171531] ? __cleanup_sighand+0x70/0x70 [ 2876.175802] ? mark_held_locks+0x100/0x100 [ 2876.180082] _do_fork+0x257/0xfe0 [ 2876.183572] ? fork_idle+0x1d0/0x1d0 [ 2876.187327] ? blkcg_print_stat+0xb90/0xb90 [ 2876.191686] ? kasan_check_read+0x11/0x20 [ 2876.195863] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2876.200649] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2876.205436] ? do_syscall_64+0x26/0x610 [ 2876.209438] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2876.214831] ? do_syscall_64+0x26/0x610 [ 2876.218836] __x64_sys_clone+0xbf/0x150 [ 2876.222839] do_syscall_64+0x103/0x610 [ 2876.226761] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2876.231975] RIP: 0033:0x45b779 [ 2876.235193] Code: ff 48 85 f6 0f 84 d7 8e fb ff 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 0f 8c ae 8e fb ff 74 01 c3 31 ed 48 f7 c7 00 00 01 00 75 [ 2876.254121] RSP: 002b:00007fff6d936ea8 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 2876.261867] RAX: ffffffffffffffda RBX: 00007efc5e477700 RCX: 000000000045b779 [ 2876.269162] RDX: 00007efc5e4779d0 RSI: 00007efc5e476db0 RDI: 00000000003d0f00 [ 2876.276730] RBP: 00007fff6d9370c0 R08: 00007efc5e477700 R09: 00007efc5e477700 [ 2876.284034] R10: 00007efc5e4779d0 R11: 0000000000000202 R12: 0000000000000000 [ 2876.291336] R13: 00007fff6d936f5f R14: 00007efc5e4779c0 R15: 000000000073bfac 04:13:26 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x39) openat(r0, &(0x7f0000000000)='./file1\x00', 0x200, 0x100) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r2, 0x0) 04:13:26 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:13:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) r1 = open(&(0x7f0000000600)='./bus\x00', 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) syncfs(r1) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000100)=0x3) read$FUSE(r1, &(0x7f0000000640), 0x1000) 04:13:26 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffe0) [ 2876.380935] Task in /syz5 killed as a result of limit of /syz5 [ 2876.387686] memory: usage 307196kB, limit 307200kB, failcnt 423 [ 2876.394877] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2876.411966] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2876.436244] Memory cgroup stats for /syz5: cache:80KB rss:217960KB rss_huge:178176KB shmem:0KB mapped_file:132KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:218032KB inactive_file:0KB active_file:0KB unevictable:0KB 04:13:26 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x1, 0x101800) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) ioctl$TCSETXW(r0, 0x5435, &(0x7f00000000c0)={0x1, 0xaf, [0x3, 0xfffffffffffffff9, 0x800, 0x2], 0xfffffffffffffffd}) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) 04:13:26 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 2876.532934] Memory cgroup out of memory: Kill process 29668 (syz-executor.5) score 1113 or sacrifice child [ 2876.600867] Killed process 29668 (syz-executor.5) total-vm:72584kB, anon-rss:2208kB, file-rss:35808kB, shmem-rss:0kB 04:13:26 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') r1 = creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000580)=0x0) r3 = geteuid() r4 = getgid() r5 = gettid() getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@local, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(r1, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$unix(r1, &(0x7f0000000880)={&(0x7f0000000180)=@file={0x1, './file1\x00'}, 0x6e, &(0x7f0000000500)=[{&(0x7f0000000000)="0e789d", 0x3}, {&(0x7f0000000240)="ef22398c35cca2de277d1973c0a650ec2f56204745977cd6e4f35baadfdb0aceab2b3fc36178c54d1d77ffa721aceed121c90ba19a97f62bc5d0429bd6c5dc675ac507967b2ce869b0ee52fa0d322f66f5f4a101e4cc0a9d1ef3e8bf90920b2d5c35c7de939e0e80fd5979658b6e2d47d04447c1d7f78395e57c37cc0069c7a237f36469bea63153d02956024b69410bc2c0f682a000a891ff165af41ed9acb07d1fd1fa1a218d404bc5756348663e7bc25891ffcd91d03a487419fdebad625617a2df76e0c74f5d9986d16bb67522b3e7dc81705d1e", 0xd6}, {&(0x7f0000000340)="44c4b49c07a309e04ab1bb76a6c83dd1eb3c52a9c0e064836606e3666b8fdf7fac3201be33b4d427bc74040030adbac85c899a04a4a00e8b379299387ceceaf6e7fc277a7594ccc37a64d049711d124f5337df7d2e0809a8681119d26295fb4067af1016ae73fa4c5bd71cb0f29e1c412eadc951778c8f14025b551298b5cff563b78265", 0x84}, {&(0x7f0000000400)="d7e927b76f332ce138333e23cc63e3f6c16c3c7e061dad365f5f0e908a8e245ca7d8393cbc7ab81c2fa474e7b0bf73cc7254a8c4037bce06a1c51998c6c8404140084f16930e82ddaa", 0x49}, {&(0x7f0000000480)="538925b9aba5633dfc92856985f7f987055c2f42345d7c4d4a4fbfac6573a901e998e7e35fc33744b4637a6c156681b73ffaa131c72c1edd39daa0e9128ad4f3b7628d722b670c56bfc0f122aaebfa20bd147ae52c34c348b1edee", 0x5b}], 0x5, &(0x7f0000000780)=[@rights={0x28, 0x1, 0x1, [r1, r1, r1, r0, r0]}, @rights={0x38, 0x1, 0x1, [r1, r1, r1, r0, r1, r0, r0, r0, r0]}, @rights={0x20, 0x1, 0x1, [r1, r1, r1, r1]}, @rights={0x20, 0x1, 0x1, [r0, r0, r0, r1]}, @cred={0x20, 0x1, 0x2, r2, r3, r4}, @cred={0x20, 0x1, 0x2, r5, r6, r7}], 0xe0, 0x200000c0}, 0x1) r8 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r8, 0x0, 0x0) tkill(r8, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) memfd_create(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) [ 2876.792912] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2876.899327] syz-executor.5 invoked oom-killer: gfp_mask=0x7080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null), order=3, oom_score_adj=1000 [ 2876.921358] syz-executor.5 cpuset=syz5 mems_allowed=0-1 [ 2876.930000] CPU: 1 PID: 15709 Comm: syz-executor.5 Not tainted 4.19.37 #5 [ 2876.936982] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2876.946358] Call Trace: [ 2876.948976] dump_stack+0x172/0x1f0 [ 2876.952640] dump_header+0x15e/0x929 [ 2876.956389] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2876.961531] ? ___ratelimit+0x60/0x595 [ 2876.965437] oom_kill_process.cold+0x10/0x6f5 [ 2876.969945] ? task_will_free_mem+0x139/0x6e0 [ 2876.974457] out_of_memory+0x936/0x12d0 [ 2876.978456] ? oom_killer_disable+0x280/0x280 [ 2876.982975] ? find_held_lock+0x35/0x130 [ 2876.987074] mem_cgroup_out_of_memory+0x1d2/0x240 [ 2876.991939] ? memcg_event_wake+0x230/0x230 [ 2876.996301] ? do_raw_spin_unlock+0x57/0x270 [ 2877.000727] ? _raw_spin_unlock+0x2d/0x50 [ 2877.004899] try_charge+0xd25/0x15b0 [ 2877.008627] ? find_held_lock+0x35/0x130 [ 2877.012711] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2877.017566] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 2877.022423] ? find_held_lock+0x35/0x130 [ 2877.026511] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 2877.031394] memcg_kmem_charge_memcg+0x7c/0x130 [ 2877.036113] ? memcg_kmem_put_cache+0xb0/0xb0 [ 2877.040638] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 2877.045510] memcg_kmem_charge+0x136/0x300 [ 2877.049773] __alloc_pages_nodemask+0x3c6/0x760 [ 2877.054465] ? __alloc_pages_slowpath+0x2870/0x2870 [ 2877.059511] ? copy_process.part.0+0x1cb7/0x7970 [ 2877.064292] copy_process.part.0+0x3e0/0x7970 [ 2877.068809] ? mark_held_locks+0x100/0x100 [ 2877.073088] ? __might_fault+0x12b/0x1e0 [ 2877.077188] ? __cleanup_sighand+0x70/0x70 [ 2877.081458] ? lock_downgrade+0x810/0x810 [ 2877.085635] _do_fork+0x257/0xfe0 [ 2877.089109] ? fork_idle+0x1d0/0x1d0 [ 2877.092847] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2877.097622] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2877.102402] ? do_syscall_64+0x26/0x610 [ 2877.106396] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2877.111782] ? do_syscall_64+0x26/0x610 [ 2877.115779] __x64_sys_clone+0xbf/0x150 [ 2877.119777] do_syscall_64+0x103/0x610 [ 2877.123722] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2877.128950] RIP: 0033:0x458da9 [ 2877.132175] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2877.151096] RSP: 002b:00007efc5e497c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2877.158843] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000458da9 [ 2877.166134] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000103 [ 2877.173423] RBP: 000000000073bf00 R08: ffffffffffffffff R09: 0000000000000000 [ 2877.180706] R10: 0000000000000000 R11: 0000000000000246 R12: 00007efc5e4986d4 [ 2877.187993] R13: 00000000004bf166 R14: 00000000004d01a0 R15: 00000000ffffffff [ 2877.219767] Task in /syz5 killed as a result of limit of /syz5 [ 2877.226715] memory: usage 304956kB, limit 307200kB, failcnt 423 [ 2877.233342] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2877.246829] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2877.254005] Memory cgroup stats for /syz5: cache:80KB rss:215940KB rss_huge:176128KB shmem:0KB mapped_file:132KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:215892KB inactive_file:0KB active_file:4KB unevictable:0KB [ 2877.282327] Memory cgroup out of memory: Kill process 30644 (syz-executor.5) score 1113 or sacrifice child [ 2877.295682] Killed process 30644 (syz-executor.5) total-vm:72584kB, anon-rss:2208kB, file-rss:35808kB, shmem-rss:0kB 04:13:27 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(r0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f0000000600)) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:13:27 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000080)={0x0, 0xd87, 0x1000}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000200)={r1, 0x3, 0x30}, 0xc) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)}, &(0x7f0000000140)=0x10) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000180)={r2, 0x80}, 0x8) 04:13:27 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:13:27 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x23, 0xf93, 0x2}, 0x2c) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = bpf$MAP_CREATE(0x2, &(0x7f0000001240)={0x3, 0x0, 0x131, 0x0, 0x820008, 0x0}, 0x3c) r2 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)="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", 0x1000, 0xfffffffffffffffc) r3 = request_key(&(0x7f0000001180)='keyring\x00', &(0x7f00000011c0)={'syz', 0x1}, &(0x7f0000001200)='\x00', 0xfffffffffffffff8) keyctl$link(0x8, r2, r3) r4 = creat(&(0x7f0000000040)='./file0\x00', 0x40) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffff9c, 0xc010640b, &(0x7f0000001280)={0x0, 0x0, 0xb3a}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffff9c, 0xc008640a, &(0x7f00000012c0)={0x0, 0x0}) lseek(r4, 0x0, 0x3) ioctl$DRM_IOCTL_GEM_FLINK(r4, 0xc008640a, &(0x7f0000001300)={r5, r6}) recvmsg(r4, &(0x7f0000001780)={&(0x7f0000001340)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x80, &(0x7f0000001740)=[{&(0x7f00000013c0)=""/224, 0xe0}, {&(0x7f00000014c0)=""/138, 0x8a}, {&(0x7f0000001580)=""/186, 0xba}, {&(0x7f0000001640)=""/222, 0xde}], 0x4}, 0x40000001) bpf$MAP_CREATE(0x4, &(0x7f0000000080)={0x3, 0x0, 0x73fffe, 0x0, 0x20820000, r1}, 0x2c) 04:13:27 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') r1 = creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)=0x2) r2 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r3, 0x0) sendmsg(r1, &(0x7f0000000740)={&(0x7f0000000180)=@nfc={0x27, 0x0, 0x1, 0x5}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000240)="d14de6fb68cdd5a7dbf62c6d2f55e7dc92", 0x11}, {&(0x7f0000000280)="dc2643a0ce3107c3324302a3171173eecde6dc717d883f0c7d022e4690ddf9774cee73799b646917f1f9aaa0bf5697aa5ffeab594026131af9e4485e19c0f33f9cbf62728895ec0cfc8c759be5b513266d3287e124377ba95441458f0dfce65e09e33b293c4daa4afad6124f21d1d632d102a356b13739a2882ef8a6e7c65cf28436e1984b3b52ae3047a10ad122157df669f3ff2533f9843d050d72433c5bef56d1e7102913160ab33653edcf790f", 0xaf}, {&(0x7f0000000340)="af2e9561daed60967d389fb9dcabd6b4523afae561f0d5a50a753be2004aa544d77a9fcd1f049d0905536a8236978244df2e2b77198d8fee60d52278edf31bf5", 0x40}, {&(0x7f0000000380)="4bf82194", 0x4}, {&(0x7f00000003c0)="d8a639d4a05d4d8a09a0d58ca766059dad3b4ea0476036c165b8864c2d220cb8b7a04ffa7be2f6ebcb3022ddc1678ac570e1bdd522152fe4ae444cdfa95f34d1975c79aea7cbadcd7ec42cd500cb17c2df34f8a9a6eb116922ba34a78e95fa508a72abac5020be1a1f894eb647287680c89ad6b416190ad033b8f369c7dd1a50a09b840a9f90fe4aed9dbb48acef594d5a9808502c82cdda701fedb1ebb0050570b134547b7b", 0xa6}, {&(0x7f0000000480)="4e2e6fe9af3c3426eec42a684d2c531b8425edfaa1326c4e221c4c18021d7ede", 0x20}, {&(0x7f00000004c0)="c8817ba71508c8a2b43eff4ea08f3151082ca0eee0b915e606bf7d9089ee80addd6f3db46fd9ad1f72dbd5588e0e4fb576da4e87b8dc579b8e05096b791ea9c78b35b0bc7508a18e7e24d89e4f27195594194a7f9e34aad1a8e945f97df7a96eeb711dbf3fe82febbca88eaa8b0a13bd7a3605f98312f43caedeaec09e1f1603731f70051e7e58e27b7c7289c4ab315c2ae7a7a9", 0x94}, {&(0x7f0000000a00)="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", 0x1000}, {&(0x7f0000000580)="d86bd49e61cc32ce62ac76cc765275244d3649b3ea54a1220d0b4fcedc831355b5e39adc56170b21dce60ae8e37eb6a68c6cc443e37b2facdc63957a18caa000ae29be81b9431c60eeee347f7d442b8bd62c4bdc0c881ffea34549ae4ecb076f6f1b6a909065ef690354a9ce7684b718d8665458da3ea8e33eb75983e1ea66bf1097edd83632e303112989e9598a3db01cc2bab65f9a23470c7f374598229868dc3dafca0df468865efb194ac4", 0xad}, {&(0x7f0000000640)="63d7e938b9e83ac66f9ea8", 0xb}], 0xa, &(0x7f0000001a00)=[{0x30, 0x1ff, 0x9, "58fd4f7da4b27bd042663608fc2273093280f084514999fcf3e24bb7"}, {0xf0, 0x10b, 0x8, "2ebe7ea54ca75fe70774848fec730ff9ac7b8afcb6b93cfe890b07a912fa68d9a763b1f69fce0cde965bf281db8588ba825bfb957bda10bea836dd74daea35953b8d3135142ab0a247f0fe7ab1acb6920fdaad480fbd9817c8e5ab0fdb18d70077f1c63130d897165ff383cbe22213248f6aa7f85fe01e744ab7d64762298f96d6eb2ec03b5030c78c47e125990fdc0f2070f6e77f5ceb7a5e946d9b3a3a16dfb5b11b49ba42c7cee3ba2acbd8641ede8f68a896bc0430e8254d510306d2d524993ec7af0f203863b8afaa8104fd656a902aa86f89439c98189aa1"}, {0x50, 0x116, 0x9, "e65eb39f818788f3f37d9332fea608baf77b5e898ebfb7be874c74d19da4dc0d5c379090f8b88074d5206ede0d11b6f9b4adc78a2ab8da8e2e3d7e"}, {0x1010, 0x102, 0x2ee9, "fbd830599de34eea1e5ff697d32502dafeac2ba112809485b4e1a598373b5c1ca1e1d82a3955a7958cb3f25556a9d6a4aa778226d287e5c40734f07b5c42c4be7c4bfcc3ae4f5c9bcf92a4cae5c29ff99758758849dda1f0ac4935c09658c226153eaca3eb8ccfc89d92683be9692eec0e7d8d93b5adddba2b63d81a273bf803155304b7e063dbdacb7386e42fd2a95f4b55a94a696594f372c98c50e6c8929ab1559ddc93095a31409f8527ccbc0454507a811d826991fcc76381457c5751fb5fbc0f763ffaca8f141d9196a293b112dc4c07d0e31b69c370571682d09b3eee041f6e0d3a7ae18cd7692bf91756b39abe9af4fae971e9a0326d9502519a5783caaf4e969d7c3d9e20b26c3fe112c43f80787de3d46e26b520265c180add5783ca83fd743a0f7377d16b5d50032055cf5627bd06e9b7fbf33cec9af9c9db38c218ba702ea15d849c7e4432798763ebd7b9e524a3265f46fc6adc703a25d7437b7f1f13f7e444731dcabd08ddf674cc9c104bd3e8301dc2e3f24d34af2ce7e3df98c40f9d6e63f5ec78c37aa0ffd34ad41bec537ca8a6940cb2628ae6d7b29d8b815e7a39b4115ef4d4913dd607bd10f4c440ec73c8c1ca95827067126faee29e632d8aa28e79501159b3dedfdae9f28c35769bc4285a4384d1dcec7550cd5e8977fb2b96398bb226c8a03f3bcf229e45c0d944084b0129f1ad10cce4a8c2d8b7972405842591e072e3ce06ae9cf37731a8da2f37c93fb724fcd451eec76a05b7bc13ab7c8add281e317fafebd7c29cdfcf3e549b18171cd0af62fc560884942af0c405ca189fb1afa10477c5b1a4696700964c4553e01baf7d1aa028e5c995e7b0ea3fc187744a645c6073436028b14227aac1257779ca27fe70563f1953906d7de9760d3dd8b34e97e5a28b59038c8e571beae2255328fd20693fd6e3c491c71f17b002cb0541649e572d6fa877ac34e4f7e7c31656010a3e0951d32fc9e3263371e3d800978a6727ebac507b9e9af01bf0c040506b347c7431ce061bd2ec08df3a2d7b2703340ff857c01b47fa2ca9df204595fbcd7e25ef54f0250461bc509a5eb6d712a5336991323799a0ac162932194187edb68ea8d564138205eeefd6eeb7506e3194cecb428e6af481787ce204c4e38e97f3a198754701808616b1a0ff3e4c8e16faa4f339db5b13acbb1e53c5e4bfee3c023fe31d3606c95f082734174e2deac1907f3c62e95a823ba90915602ecd1430ad2a6a8bb8787e21b8ab7cc6251ffb34ebf19c935cc05a606e23e6943bf05fc439ccf03b32de6b6692c5a448c8498c3fa9efa64153e2c63ace9c4aad43bad6611201ab400f925346ecf22b54f7efcb088973cbc846e74847fb66f371065914f6c27b7db55c9ad8385e7e33b52a8e2fa34558ac3feed2cdd966a607f533b7d622bb0fe772833d98cee485ae085959faa65ac252b62c2bf8e31556819086d27e98dd3bb5daf944a747834a7956bcbcd0013ec7e85bb344ed6bf87a244d897c79c97519a0a72e03bbc1e002f4de2f5a1c1a49196939b482d1a2255b7179434797903fec510305bf04d58572b677ca69e4801c7422b223e5a2bdd63acf0e4686f72978b47c10b4d721ed4161c6290baa58f258cb5be93ba35040bd977bbb1ac1371350bba0fe8fb2c9def49914ab9a0509fe75e86ef4b3f79010d0fac63b940d9c6c5a596cc0e27cc890cfb64c34ec05424bac765d0cb453f37bf82f1ad6161d6744d2b1713c1e86009cd769e4dde71397eda910136257e8f4dbc5ecd54e9f0cb383cb4378157ec4b5926a2dc51ea53582db641fae3f9ff2e60f7b196aa6ef1d6f50a764005c08005ac2c63b89f2745ed216234562a0864abf45e273656917fc0c3b35ba3b192ab95fc05700595f7b05a37cfd8511f8684a4bb5ee8ae21424c556ea986e09be2ada87335f76f5d02f1a5a3dc3a97d833b9f60b0ebaea5d0b952569b0fc54a87c6a5ea91acad28875fb5b88bf844f70a7aa8599a6a24658a0d9a414b93f141a2ebbb2a66f15d96ba07a9d732b744f57b5aa35f84fd485ef96a89410b3e5905a5fb7c579937041114687fce2dec96bb561b64b8729ae4167b020035ef75160116843274ab2775f540f5115253366e44cefd78e76ebfbefe1fcd46d8d0ba9a4c4541c34f87a16a359d982c4b5d727185ccf845fe842eb4da09d97b9794dd1060bdd2f239d202a76e6295bb25f9c4732c474351485629baad904c88549492a0fabe3b5f821dc415298ff8469f5293e2f92aecf893c5665ff58c1651275f8ce4f7943600192f3a9d923b6e1e6bb0adeb2536e922bd9c89e1067ca2aeb33778788376c8e3e6e4fb6504618c89539463f721fecbb311e20bd1fbb203d87e2da498eb250e356a399c5e0295e52ab48b65fd2af625bd5e50c263d6da019f39171e0847fb3b5e79e4f7b4bf28624f095e80610b298a9e392ed40713589a60a846e268a76f2d3d51f9d3600e22255af28dbbd0003db9d4733142a2300f022d24a30fd66dd480c657dc07d36a9825d7454eb9288eff3dd2d31f8168a5caaa3598a6b6df326749c0d5cd3a7be9c70e1bc6430b3a1c1410c56e31011d7d847ffd00f7aa36af4bce43ed20c00d9794a4e376fea5a50252a7303b480a9964c89cabc96b950cf778efa18afdf32b7d9ac1992d8b7f3a2496871c0f9449a5438258dd6f1315ad482e3644e584d813d37ada75c5d67cdb190ac08729c95760ce1b5e98c5884f9f114bb82b7368e3643076b7a7557bb3b690537059eb58c47f72265a3c154df96ebc55d1acf0bec6b83406f55bdcfcc09c8c839a9c0f65929c84797bb9eb1923cbe8d1ce742fe5dcfd8f720d52eba18ad972211886d7bb1e39eb1bbd67a5867ffd73ecf9e33b658ed95c37b9d95fdce70451c777df4b542466cdd52267e284a7bfcd8a7c946b0b23937c0e497962853d71354dcb01336fb250f6ebc7430b3c590d51a047847095a6f65d7396d2503666ee04acc3b5b2addebf2d65db7db43098f1ea4415f6b7ddb23f37fcf4e7083cdc1bd9f0beed25b8b2ce355716592e0a9cdff8f689c0ef123bb707d83e7ed7348642f58b7f7f9b0e3e85a420032f095776779a556a43a5eddf80f0c762feeb586a49c9fd434bf1dac7d8f147c8df07e260aa4bc654898826f557bae045c5ecc2391fa5a6788e497aa0cc34d6b4a89255754413546681800aca96fe1002ce4e4e1045cab485df573ab6d7af934b8c80903976ff805782c0741920ced14671f20b83aaf398a95834fec965b35ed6f2f17ee52fff8d26f0c34208e38f2f242cc563e5b3e85728b6c2401336eb176ef2bf44ede4e1638a1dfb06d0c1731b46b9d1c60d5a4a0a75bbb6b238d7065fa0bb755f0dd4c385731a91b9814858533c21cb6e5827f12716e91638455809e2328d8ebf1c0f8222b193bb60349b954373dd9c3945b8f308bbf7f2f12fb83c86d53e75816b368dc3cf6d9f5b1cd6194904792daefc79c94185a58bb08643498c722b69816562c1b89ecd49e5064573b3e0f56b861c8541d2e3631dd2cb39d913beb5d80270814ddcea5d13218d73470f4b797f0f308f4ed4dc8f4ad86b99b25ca9c7579ded229082dff9483a9fe74e673ba0083346caca6fd942db84f38c47280d5bbfec7a3fffc4449916fab6fd6ba8b9b3efb11b71b39929355656df8c5c0ae80f45e92fcd84b7cc579c9f3da2a9f9695a934a1e5f05f9e962d81940bcdd3082ec4051c3804643eeb121448c950fbf3900975d635f9c3b65be6fb5204e1d7aba1fa5732d26b16ebc82f53acbc266535b9412cb30525c4e23e4036eb12a875d877e19f54796593b8d2c8d99e78c2bd3582675dc706fe35179811a7e1a4a3bf5c6b8a9c5a0e7bedf383d833ef0be403e747b68469c3e5380a6c486fbb33b9d8a0c0f000765157bca93d275588ad212189195ea5f44650ccd5b856c51a632944b3e55d1f586cae4b817817c29595b60145a9420c1e6b71fd4ced0d31013902e1647428268de91901ef86269d1dbae6c8deefa1df80b1fe677538d13b6c7ebd420514c0864f52ec6191baa4020eddd9d5fd8365e562ef9810a9624925376ed36f485eaeaccc11de05d7baad6f23a0e8e23a275f7c3fbb718ef9b22afeaaa40f4e6b22a7f7d8c63ecc22c28007899af7d42a67f838b26167eda247fc30871b7d9d5451ad900b012b5e76b1eebd4302445cd175945264f91a1cef643dec670eeeccc8ece8582b034f5566c0a3b9bc7739d7816922702ec920fd4c84e75c896f9a072cc023a84551e6004146224ba97497f1067a84845bf591d37c285c3a511c659e85707175596d229db3afae18827c07b98c46c03ce6f4f0c6a5ea332036da2e8d240c3168524a870bea117b6d95687440f0cb2c89fed1f6473821534340ab5c22b43c7fc8d7959fbd0d566afa12a0efa209ad05c39f34402a3a96582abb99f3947272fd44c78bf7c6103de5f313ac55571958d1e31978b8cbaa0572eca7e81379c7e61617103fa7b5d89b21d66e816e9ae99a1dc9aef40fd16f8827fe005f6b96652eb69b258aacd4a31c01e00ab1ab04330d865f760b60b9f4944372b910d55c8b957aa09a696d4908017886b5b80ae26cc262be9e24c6f5a15dbbf5beae5ed5798bc0554299e01cb57be88418afd4dfb07dfce6bd6b26c83e918d1d6e51fa6068f819e90dc1894ab634f1eab313d99b20ecce388c47a23a25c5478fcd363b542516e31a4b52d2e44a7e1e122c2ade15d4da909b2c37728168228126915f312511e0cb92eb469e9f746f86ebe071ccd54c12d2741f38626565641b855d3bf5a39756bc6e203d8fd1a24268fdb0719b493db47f1ba0397934a32d7ef73c269dc9cb318f6fcc327aa841c09280978eb0f26969c5a6d90ea72ceeb9d69e451bc363afaa206d2c8b55918c038a26cbda255929db04198acdab4636fc41495eee20f352d1aa52614401387492036713a2030f73eb11ba5c0bf8570b32f0232ab4f6660514ca3b84dce0e9b831654590b672793d71b472b6aa778254b1ac7f9f863d29216e0df7e7d8c9ad8a1d5ec01fa2aecbd5fd4a8ee217de78bef42168f9a1e092880934f94bcbad090ad98f0406f70dcccd478711e37c502f7921caa771b6220ae60882d5fd0247c3c78a7e3aab394047af967527987d2a0ac7d099d7f856004245cd882bd131d62605138cae0154f571ea57939363210425bbd562afc7eefecf457f1cd166373553561e8b145fa0778e84f7cb8e41b279b2c9a513e33bf3b1653ed9329d3c68cba48359a3f94f34bddd10b57dbf916ca59037e42e45b0bf7e97dc171fdb957283bb842cef64e5a4453a4c34b4c3cb1a1fab4de77eab4f372bcae59a0231ea03b1c0f22d095ea4895fd00022de692f84ae4071d02f6594fc4ce7a7f40cea0d637f2aae6691b7314a9a6026b7bd73f34882be41cd9017e0e4ff3a6140add4f84f60d67a377ad710f4845d64eac7d31e02b14e66b6df3da255cc77489d9cd9abd389159b61b5e3474685d278e2ef304123da765544a7ec8c9599b93fb98f72e921c7e03fc9cb5cfbc1f1212f14061473737bfbfb5ca359d43cb91a88dd71def636154e93d9f78ecaa604c3a9e61a4918e8b8ad85e7452c6380d5897f508aa6d4d051fe224080f454f8c8fd78114d51d5aede2118aedef12534d85523dd239dfd213e47d290d1eeb74bf8bc5c4b32c0151eb726d8f3141b9b836e007bdb9470f645c2517bd078163a00398534ab30db309130a08ac8cb4e6a77fd0f8a208ffae485263a43fbf6eb3fba556"}], 0x1180}, 0x80) getpeername$packet(r0, &(0x7f0000003f40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003f80)=0x14) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000003fc0)={r4, @multicast2, @remote}, 0xc) 04:13:27 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) memfd_create(0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000)=0x200, 0x4) write(0xffffffffffffffff, 0x0, 0x0) [ 2877.316596] oom_reaper: reaped process 30644 (syz-executor.5), now anon-rss:0kB, file-rss:34848kB, shmem-rss:0kB 04:13:27 executing program 4: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) lsetxattr(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)=@known='com.apple.FinderInfo\x00', &(0x7f00000006c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0xf, 0x2) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af22, &(0x7f0000000700)={0x3, r0}) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f0000000600)) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x4, 0x1000) ioctl$VIDIOC_SUBDEV_S_SELECTION(r3, 0xc040563e, &(0x7f00000004c0)={0x1, 0x0, 0x102, 0x2, {0x7, 0xac, 0xfffffffffffffff8, 0x2}}) 04:13:27 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) setsockopt$XDP_TX_RING(r0, 0x11b, 0x3, &(0x7f0000000040)=0x20040, 0x4) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) 04:13:27 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:13:27 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000080)=0x5) mkdir(&(0x7f0000000040)='./file1/file0\x00', 0x0) 04:13:27 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:13:27 executing program 5: r0 = creat(&(0x7f0000000400)='./file0\x00', 0x0) clone(0x5ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0/0.1\t', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB='trans=rdma,']) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(r0, 0x0, r1, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r2) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r3 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r4, 0x8921, &(0x7f0000000600)) sendmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:13:27 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) close(r1) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001a00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000019c0)=""/61, 0x3d}}], 0x1, 0x0, 0x0) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x6, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}]}) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000040)={0x0, @broadcast, @local}, &(0x7f0000000080)=0xc) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000180)={r3, 0x1, 0x6, @local}, 0x10) sendto$ax25(r2, &(0x7f0000000280)="a3b5bea993b72aea408bb97a5ae2395a47313418091c82933641758c937a793bd0bec19529d1b0b0cd5d12fcffc6a7ac5c8fe4824144c35edde08b4039863598aa160be3533e6cafb3d1f60c99f8adbbcd25eb862c6bd5d80b12a86333520c5ae4f1a6649559782b6c434ed21e462f860df755c2ceada3121f0807c5f6b8b01b8889c3a458574c746f007135778d2848cb6bcf4e73f9961b1c367e6502c8faab60ba6693ebfcbdf67ac5072d431a03ad0efd38a9e759d41ee990e42f9df40af8", 0xc0, 0x4048084, 0x0, 0x0) readv(r1, &(0x7f00000002c0), 0x1000000000000385) 04:13:27 executing program 0: r0 = socket$inet(0x2, 0x6, 0x400) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000000040)={0x0, 0x100000001}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000140)={r1, 0x1ff, 0x5, [0x400, 0x800, 0x3, 0x7fffffff, 0x2]}, &(0x7f0000000180)=0x12) r2 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) [ 2878.094407] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 04:13:27 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x20000000000) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) setsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, &(0x7f0000000040)=0x8, 0x4) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0xb) 04:13:27 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:13:30 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r2, 0x0) 04:13:30 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') r1 = creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() semget(0x3, 0x2, 0x102) lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x80, &(0x7f0000000000), &(0x7f0000000180)=0x4) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x39) openat$vfio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vfio/vfio\x00', 0x101000, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) memfd_create(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f00000001c0)={'eql\x00', {0x2, 0x4e22, @multicast1}}) 04:13:30 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$VIDIOC_S_MODULATOR(r0, 0x40445637, &(0x7f0000000640)={0x1f, "bdd5c78f0296627f228fae6908202d1bce4f0aa85d47f3798d60a4066ae0ef1b", 0x10, 0x9, 0x100000001, 0x0, 0x5}) r3 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000004c0)=@assoc_value={0x0, 0x3}, &(0x7f00000006c0)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000700)={r4, 0xfffffffffffffc00}, &(0x7f0000000740)=0x8) r5 = syz_open_dev$vcsa(0x0, 0x0, 0x3ffffd) ioctl$SIOCGIFMTU(r5, 0x8921, &(0x7f0000000600)) sendmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:13:30 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:13:30 executing program 0: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x404048) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r0, 0x40405515, &(0x7f0000000080)={0x5, 0x1, 0x4, 0x80, 'syz0\x00', 0x5}) setxattr$trusted_overlay_opaque(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', &(0x7f0000000200)='y\x00', 0x2, 0x2) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) accept$nfc_llcp(r0, &(0x7f0000000100), &(0x7f0000000040)=0x60) 04:13:30 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x410200, 0x0) connect$netlink(r2, &(0x7f0000000040)=@unspec, 0xe6) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x2) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x51, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x28000, 0x0) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 04:13:30 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) 04:13:30 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:13:30 executing program 4: r0 = socket$inet(0x2, 0x1000000000000003, 0x4) setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000cb1000)=0x20000000000005, 0x4) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0xc1, 0x4) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x8, 0x100) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$VIDIOC_STREAMOFF(r1, 0x40045613, &(0x7f0000000100)=0x2) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$SG_SET_COMMAND_Q(r1, 0x2271, &(0x7f00000000c0)=0x1) recvmsg(r0, &(0x7f0000000480)={0x0, 0x5b, 0x0}, 0x0) 04:13:30 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r0, 0x0, 0xb, &(0x7f0000000040)=',mime_type\x00'}, 0x30) sched_getaffinity(r1, 0x8, &(0x7f0000000140)) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) 04:13:30 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SIOCAX25NOUID(r0, 0x89e3, &(0x7f00000004c0)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f0000000640)) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:13:30 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 2881.276393] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 04:13:33 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') r1 = creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000240)="8619ac79a76d45122b4fedc64793a640d41d0208c76c57a60aa40e20976520fef655b56659e706e717944eca0eadc2cbc175b50ac80380411e055a3c8752fe48823140eeb19cebc18895a654b1ecb003d2e93abc4d344a55cd0562aa6b2acb77086cef146fa2d4530a9cdb60b4e2b792c98f75a720d45640773cc0301f2f83759d63370088c068fc3a409fb65685e77487d440c35b40a2eb20a7328450db4f7e021679a1", 0xa4}, {&(0x7f0000000300)="241b7aabe52218dd287a30a3b643dd2f6549594ea9c8a220694d538d7afceeebef083ead5beda0d17b4e50d92b1989912c90f3eebf76abc308845d15e4f6e499f21915c311c76fe05f71dc6f34e044468ff028003f4a66efdfade2f9bb9033233cc059c8e75d2c0445f30b0fb9e14ae4f3843b97329c953f2472b54816ee33d94b802f01d694203fee98b38d46c00f02651b8cfdacf19cdbb6d0d3b35d701d4dfe0ae85ff5d082eaf676144dbef1ae38a19045b4b867a22c114b0920fa7b03fe7ff211d0f353f902e9666bcd43fdac414d3fb4fc289a52445b23571bff7f7e48a806af4918c815", 0xe7}, {&(0x7f0000000400)="eb6857e2adc877428acd2f8ed79abd92e1c123d5e62e92fe73f5b8d78dad895dd4295e1f7eef050f903a36aae6cc0a29cc1b1524d30f711e01902fb0855b6779b2afb391baf66d53a84246af3853df2f5763e434c61545133773beb819b4c3b7ccaf798936a408a615ba1a7cf230b9daec680a964f3f459a464cdf14677791cb2d2a0a3095866e775f981019b55bb4e30216767a78f08f4c45b241c8bf87a4ef72a40fadebf39f4ac37cf17525f14525dae9eb23348d17bcb4d3f920f90a89276180c9a7ab5f9877fd9e76f03726710f238ef52b37c064f07e0bfb4c0ee3002f4d12e7", 0xe3}], 0x3, &(0x7f0000000500)=[{0x110, 0x10f, 0x2, "3e1cd2262b049358e28e7f0ad55d1e05d0d962e403ffc067ad61ecd06bc75dbb5e23d91af3ce6e510de8df7e1b3fdb6ca6cd9d0f571f3bfc98601d60e2a204b5f64ce89901f4d2faa2eaf1ef196179969a9f733cea7a1387addf32b05f34fbf9cbb0b33873fab630aef25e99cb97addab46f1bbe25d6b236ed46bcc39a0797b6d9316e055b715abf8252fadc335a1babea7da2abe8c5b4899fe8ef148234d0c5e559a826f81c848ead25bb85b0eb30aa04bc2e2f000ba480823b0428ed8cc80b0105579bf347de0cb50dd4436155856322950fca3069c47d40bdf41d5f10d8b76b211d10fccae71ff240e5fba2f57d1a7d1edd6f40102a44a0"}, {0x88, 0x111, 0x5, "64001b401d2a3925d7c688996290accc6292362d69afe5e03a70a7b113efd88436d30250feca4f0c57bc5355bdd4cface1cbc82c6fff96c1a1462047512775c6c71913569f2d0d6854715ae58c6b21c390e645424111ae9e128c425dbd9ceeb59ef2ba32231a36f6f8fbc69861dee4330795e53b72f9bb7b"}, {0xa8, 0x111, 0x6, "f1a45369b0a9e2fe93514891f48a03908e844b776a4fbd88a4c3006444770593c77ff837d38b3018a099dd9c4a78950c3ae1ee89d836f06b6bbe04cb5f0267a162f61651b8b8f5fabc42a15080d8b17ee1d29850852170285136920f5f4f8aa0a51970af5ec48c9d0885d7a2a4e5952b4da682395f7f8a50feb0feaa601c939557e7309f778a52c97a67183022c85a8712ec"}], 0x240}, 0x8001) lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r3, 0x0) 04:13:33 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000), 0x106, 0xb}}, 0x20) tkill(r1, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) memfd_create(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 04:13:33 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x80, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000240)=0x3) r2 = dup3(r0, r0, 0x80000) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_GET_PACK_ID(r2, 0x227c, &(0x7f0000000280)) fsetxattr$security_capability(r2, &(0x7f0000000080)='security.capability\x00', &(0x7f0000000200)=@v3={0x3000000, [{0x4, 0x8}, {0x2, 0x8}], r3}, 0x18, 0x2) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000100)={0x79, 0x0, [0xffffffffffffffff]}) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r4, 0x8040ae9f, &(0x7f0000000040)) 04:13:33 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x8043, 0x0) write$vnet(r0, &(0x7f00000002c0)={0x1, {&(0x7f0000000140)=""/79, 0x4f, &(0x7f00000001c0)=""/240, 0x0, 0x2}}, 0x68) fremovexattr(r0, &(0x7f0000000340)=@known='trusted.overlay.origin\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x117, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000400)={0x4, 0x8, 0xfa00, {r1, 0x5}}, 0x10) r2 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$TIOCNXCL(r0, 0x540d) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000380)=0x30000) ioctl(r2, 0x5, &(0x7f0000000080)="231a3b5e2be2c17fddf17587d3e3a5a3679a7270c0f1a9c9a00866168766e3b357d98d10258c54d3565e7434c7188b31f2ab30ef1267bfc49b879fab9905cbd1969a5b9e84c10904d182b842eaf4a3481e") 04:13:33 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:13:33 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(r0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r3 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x80000000) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r4, 0x8921, &(0x7f0000000600)) sendmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) r5 = syz_open_dev$cec(&(0x7f00000004c0)='/dev/cec#\x00', 0x3, 0x2) write$P9_RMKNOD(r5, &(0x7f0000000640)={0x14, 0x13, 0x2, {0x0, 0x3}}, 0x14) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:13:33 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCSABS20(r1, 0x401845e0, &(0x7f00000004c0)={0x1000, 0xffffffff, 0x6, 0x200, 0x7ff, 0x6}) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f0000000640)='vboxnet1\x00', 0xfffffffffffffffb) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r3) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r4 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r5 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r5, 0x8921, &(0x7f0000000600)) sendmsg(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) r6 = semget$private(0x0, 0x0, 0x0) semctl$SETALL(r6, 0x0, 0x11, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x6, 0x50, r1, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:13:33 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000040)='./file0\x00', 0x7d) 04:13:33 executing program 4: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SIOCAX25NOUID(r0, 0x89e3, &(0x7f00000004c0)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f0000000640)) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:13:33 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:13:33 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) acct(&(0x7f00000000c0)='./file0\x00') ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x80000, 0x0) 04:13:33 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 2884.363356] FS-Cache: Duplicate cookie detected [ 2884.369782] FS-Cache: O-cookie c=00000000042bb180 [p=00000000e1effc7e fl=222 nc=0 na=1] [ 2884.378289] FS-Cache: O-cookie d=000000002f2addca n=00000000475447f6 [ 2884.384967] FS-Cache: O-key=[10] '02000200000002000000' [ 2884.390936] FS-Cache: N-cookie c=00000000c19ed202 [p=00000000e1effc7e fl=2 nc=0 na=1] [ 2884.399104] FS-Cache: N-cookie d=000000002f2addca n=00000000e4036d95 [ 2884.405871] FS-Cache: N-key=[10] '02000200000002000000' [ 2884.433883] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2884.487624] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 04:13:34 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() lsetxattr$security_selinux(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0xfffffffffffffe88, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x39) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0x74, &(0x7f0000000180)=[@in={0x2, 0x4e22, @empty}, @in6={0xa, 0x4e20, 0x0, @mcast2, 0x6}, @in={0x2, 0x4e24, @empty}, @in6={0xa, 0x4e23, 0xffffffff, @loopback, 0x444a}, @in6={0xa, 0x4e20, 0x9, @remote, 0xfff}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000280)={r2, 0x36, "56fe8741739c91825645195440aca1063c96fee4ea417d42927fe4b2bde177d495d767fb2bce8034981f37cb958937026bde7fcf1e26"}, &(0x7f00000002c0)=0x3e) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r3, 0x0) 04:13:36 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) memfd_create(0x0, 0x6) write(0xffffffffffffffff, 0x0, 0x0) 04:13:36 executing program 0: open(&(0x7f0000000100)='.\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x80000000000000) 04:13:36 executing program 4: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SIOCAX25NOUID(r0, 0x89e3, &(0x7f00000004c0)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f0000000640)) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:13:36 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:13:36 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f0000000600)) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r0, &(0x7f00000006c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000800}, 0xc, &(0x7f0000000680)={&(0x7f00000008c0)={0x138, r4, 0x200, 0x70bd26, 0x25dfdbfb, {}, [@TIPC_NLA_NET={0x30, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0xe1}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x5}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x3}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x260ea867}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1000}]}, @TIPC_NLA_SOCK={0x2c, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x25f3}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xe7}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xfffffffffffffffb}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x4594}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NET={0x2c, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x3}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x401}, @TIPC_NLA_NET_ADDR={0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x109e}]}, @TIPC_NLA_LINK={0x10, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}]}, @TIPC_NLA_LINK={0x68, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}]}]}, @TIPC_NLA_NODE={0x24, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x47e}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x101}]}]}, 0x138}, 0x1, 0x0, 0x0, 0x40080}, 0x80) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:13:36 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0xfffffd09, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$rfkill(r0, &(0x7f00000004c0), 0x8) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f0000000600)) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) ioctl$sock_proto_private(r0, 0x89ed, &(0x7f00000004c0)) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:13:36 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x7) 04:13:36 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 2887.548264] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 04:13:36 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x408004) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000040)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}) mq_timedreceive(r0, &(0x7f0000000240)=""/88, 0x58, 0x5, 0x0) r1 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x1, 0x2) mkdir(&(0x7f0000000180)='./file1\x00', 0x23) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) utimensat(r1, &(0x7f0000000080)='./file1\x00', &(0x7f0000000200)={{r2, r3/1000+30000}, {r4, r5/1000+30000}}, 0x100) 04:13:36 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:13:36 executing program 4: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SIOCAX25NOUID(r0, 0x89e3, &(0x7f00000004c0)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f0000000640)) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) [ 2887.864664] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2887.889255] FS-Cache: Duplicate cookie detected [ 2887.894024] FS-Cache: O-cookie c=00000000b24767df [p=00000000e1effc7e fl=222 nc=0 na=1] [ 2887.902328] FS-Cache: O-cookie d=000000002f2addca n=00000000dfd3f476 [ 2887.908896] FS-Cache: O-key=[10] '02000200000002000000' [ 2887.914348] FS-Cache: N-cookie c=0000000027453291 [p=00000000e1effc7e fl=2 nc=0 na=1] [ 2887.922532] FS-Cache: N-cookie d=000000002f2addca n=00000000772f1189 [ 2887.929097] FS-Cache: N-key=[10] '02000200000002000000' 04:13:37 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000004c0)={0x2a, 0x4, 0x0, {0x1, 0x80000000, 0x2, 0x0, [0x0, 0x0]}}, 0x2a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f0000000600)) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:13:37 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x39) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) memfd_create(0x0, 0x0) ioctl$BLKROSET(r2, 0x125d, &(0x7f0000000000)=0x9) write(0xffffffffffffffff, 0x0, 0x0) 04:13:37 executing program 3: r0 = creat(&(0x7f0000000100)='./file2\x00', 0xfffffffffffffffd) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') r1 = creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0xfffffffffffffd18, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x39) shutdown(r1, 0x0) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(r1, 0x6) r4 = memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r4, 0x0) getpeername$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000180)=0x14) bind$can_raw(r3, &(0x7f00000001c0)={0x1d, r5}, 0x10) 04:13:37 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:13:37 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) signalfd4(0xffffffffffffffff, &(0x7f00000000c0)={0x41b6f460}, 0xffffffffffffffc5, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)) syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') r0 = socket$inet_udplite(0x2, 0x2, 0x88) socket$kcm(0x29, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="1c13b5b598cd801b69e4f56962f5696200d9d9d017795bf9f2680c0000008fe9589b26c7e4c753fbc4e101edfec4427d82663ed107c4c2b90a23f2168f4808eebce00000802000c422b18cb6070000005151c4a27d181ec1ea01ef7265dc5f00c35b5b304545e269a8419966030faee42c240f54635bdef2460f5e6061a1e1e0ef26400f0d18c401fe5ff6e30fad6736660fd2938c000000c4c1f913376666450f17720d2e440fc7bf0d000080450fa8") 04:13:37 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x20000, 0x0) ioctl$UI_SET_MSCBIT(r0, 0x40045568, 0x2) syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)=0x20000000) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) 04:13:37 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r3 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000680)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r4, &(0x7f0000000800)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x2010000}, 0xc, &(0x7f00000007c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="a4000000", @ANYRES16=r5, @ANYBLOB="000a2abd7000fedbdf250e000000080004000500000008000600090000000800040000000000480001000800e9ff08000000080009003b00000008000500030000000c00070002000000020000000c000700200000000100000014000300fe880000000000000000000000000001140002000800040001fcffff08000600050000001c0002000800070013000000080007000100000008000900ff070000"], 0xa4}, 0x1, 0x0, 0x0, 0x4000000}, 0x1) ioctl$DRM_IOCTL_RM_MAP(r4, 0x4028641b, &(0x7f00000004c0)={&(0x7f0000ffd000/0x1000)=nil, 0x200, 0x0, 0xa8, &(0x7f0000ffd000/0x2000)=nil, 0x42a}) ioctl$SIOCGIFMTU(r4, 0x8921, &(0x7f0000000600)) sendmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) dup(r2) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000008c0)={0x4, &(0x7f0000000840)=[{0xa, 0x2, 0x6, 0x34}, {0x1, 0x8000, 0x5, 0xc0}, {0x3, 0x6, 0x8, 0x91}, {0x10000, 0xe4b, 0x4, 0x1f}]}) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:13:37 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f00000000c0)='./file0\x00', 0xfffffffffffffffe) 04:13:37 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:13:37 executing program 4: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x2, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000040)={0x1}, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000001c0)='dctcp\x00', 0x6) [ 2888.484804] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 04:13:37 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r1) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r3 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r4, 0x8921, &(0x7f0000000600)) sendmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) [ 2888.558738] audit: type=1326 audit(2000002417.567:8141): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=15996 comm="syz-executor.5" exe="/root/syz-executor.5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45bc0a code=0x0 04:13:37 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x39) creat(&(0x7f0000000000)='./file2\x00', 0x11) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r2, 0x0) 04:13:37 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) 04:13:38 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') r1 = creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000106, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() write$P9_RSETATTR(r1, &(0x7f0000000000)={0x7, 0x1b, 0x1}, 0x7) lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x39) gettid() msync(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x5) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) accept4$unix(r3, 0x0, &(0x7f0000000180), 0x800) memfd_create(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f00000001c0)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000280)={r4, 0x4}, &(0x7f00000002c0)=0x8) 04:13:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setfsuid(0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000000)={0x0, 0x0, 0xffffffffffffff9c}) accept(r1, &(0x7f0000000580)=@caif, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, 0x0, 0xffffff92) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0xe) write(r3, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351d", 0x1c0) sendfile(r3, r4, 0x0, 0x10000) r5 = syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0x0, 0x10008002) ioctl$sock_FIOGETOWN(r5, 0x8903, 0x0) rt_sigqueueinfo(0x0, 0xc, &(0x7f00000001c0)) close(0xffffffffffffffff) openat$audio(0xffffffffffffff9c, 0x0, 0x10002, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000040)={0x0, 0x0, 0x3016, 0x0, 0x3}) 04:13:38 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$P9_RWRITE(r0, &(0x7f0000000040)={0xb, 0x77, 0x1, 0x7fff}, 0xb) 04:13:38 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:13:38 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) vmsplice(r1, &(0x7f00000007c0)=[{&(0x7f0000000700)="eb4df8bde71fad14a794271a6a20eece906b63fed741a9e0f0d756c0c07eb74f12cf3c19088392c5f6c2f70883af38fcfaff79999002eecb45daf5a79975a99f1645532722dbbbc111205a9bf8fc5f10f3d026", 0x53}], 0x1, 0x7) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r3 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r4, 0x8921, &(0x7f0000000600)) sendmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mount(&(0x7f00000004c0)=@nullb='/dev/nullb0\x00', &(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='bpf\x00', 0x2, &(0x7f00000006c0)='cifs.idmap\x00') mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:13:38 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r3 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) ioctl$NBD_SET_SIZE_BLOCKS(r0, 0xab07, 0x4) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r4, 0x8921, &(0x7f0000000600)) sendmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) fsetxattr$security_smack_transmute(r1, &(0x7f00000004c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000640)='TRUE', 0x4, 0x3) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:13:38 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000140)={0x5, 0x1, 0x3, 0x7, 0x9}) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f00000000c0)) 04:13:38 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 2889.871923] audit: type=1800 audit(2000002418.800:8142): pid=16050 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="loop4" ino=279 res=0 04:13:38 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x103200, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f00000000c0)={0x0, 0x10001, 0x6, [0x4, 0xffff, 0x4, 0x9, 0x7, 0x5]}, &(0x7f0000000140)=0x14) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000180)=""/85) open(&(0x7f0000000100)='.\x00', 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) 04:13:38 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 2890.007795] audit: type=1804 audit(2000002418.828:8143): pid=16050 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir678550451/syzkaller.8IMJnU/680/file0/file0" dev="loop4" ino=279 res=1 [ 2890.073161] syz-executor.5 invoked oom-killer: gfp_mask=0x7080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null), order=0, oom_score_adj=1000 [ 2890.107028] syz-executor.5 cpuset=syz5 mems_allowed=0-1 [ 2890.124979] CPU: 1 PID: 16077 Comm: syz-executor.5 Not tainted 4.19.37 #5 [ 2890.131959] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2890.141372] Call Trace: [ 2890.143978] dump_stack+0x172/0x1f0 [ 2890.147619] dump_header+0x15e/0x929 [ 2890.151355] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2890.156490] ? ___ratelimit+0x60/0x595 [ 2890.160406] ? do_raw_spin_unlock+0x57/0x270 [ 2890.164846] oom_kill_process.cold+0x10/0x6f5 [ 2890.169555] ? task_will_free_mem+0x139/0x6e0 [ 2890.169572] ? find_held_lock+0x35/0x130 [ 2890.169594] out_of_memory+0x936/0x12d0 [ 2890.169613] ? lock_downgrade+0x810/0x810 [ 2890.182246] ? oom_killer_disable+0x280/0x280 [ 2890.182263] ? find_held_lock+0x35/0x130 [ 2890.182288] mem_cgroup_out_of_memory+0x1d2/0x240 [ 2890.182304] ? memcg_event_wake+0x230/0x230 [ 2890.182323] ? do_raw_spin_unlock+0x57/0x270 [ 2890.182340] ? _raw_spin_unlock+0x2d/0x50 [ 2890.182366] try_charge+0x1028/0x15b0 [ 2890.216595] ? find_held_lock+0x35/0x130 [ 2890.220693] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2890.225566] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 2890.230442] ? find_held_lock+0x35/0x130 [ 2890.234534] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 2890.239408] memcg_kmem_charge_memcg+0x7c/0x130 [ 2890.244080] ? memcg_kmem_put_cache+0xb0/0xb0 [ 2890.249368] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 2890.254221] memcg_kmem_charge+0x136/0x300 [ 2890.258473] __alloc_pages_nodemask+0x3c6/0x760 [ 2890.263176] ? __alloc_pages_slowpath+0x2870/0x2870 [ 2890.268211] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2890.273750] alloc_pages_current+0x107/0x210 [ 2890.278178] pte_alloc_one+0x1b/0x1a0 [ 2890.281983] __pte_alloc+0x2a/0x360 [ 2890.285609] __handle_mm_fault+0x3416/0x3f80 [ 2890.290031] ? vmf_insert_mixed_mkwrite+0x90/0x90 [ 2890.294921] ? find_held_lock+0x35/0x130 [ 2890.299000] ? handle_mm_fault+0x322/0xb30 [ 2890.303243] ? kasan_check_read+0x11/0x20 [ 2890.307413] handle_mm_fault+0x43f/0xb30 [ 2890.311500] __do_page_fault+0x62a/0xe90 [ 2890.315579] ? vmalloc_fault+0x770/0x770 [ 2890.319694] ? trace_hardirqs_off_caller+0x65/0x220 [ 2890.324724] ? trace_hardirqs_on_caller+0x6a/0x220 [ 2890.329669] ? page_fault+0x8/0x30 [ 2890.333221] do_page_fault+0x71/0x581 [ 2890.337021] ? page_fault+0x8/0x30 [ 2890.340559] page_fault+0x1e/0x30 [ 2890.344180] RIP: 0033:0x4400d9 [ 2890.347395] Code: b7 0e 66 89 0f 48 83 c6 02 48 83 c7 02 0f 1f 40 00 f6 c2 04 74 0c 8b 0e 89 0f 48 83 c6 04 48 83 c7 04 f6 c2 08 74 0e 48 8b 0e <48> 89 0f 48 83 c6 08 48 83 c7 08 81 e2 f0 00 00 00 74 1f 0f 1f 40 [ 2890.366304] RSP: 002b:00007fff6d936fd8 EFLAGS: 00010202 [ 2890.371691] RAX: 00000000200000c0 RBX: 0000000000740078 RCX: 0030656c69662f2e [ 2890.379025] RDX: 0000000000000008 RSI: 0000000000740098 RDI: 00000000200000c0 [ 2890.386327] RBP: fffffffffffffffe R08: 000000006bf79866 R09: 000000006bf7986a [ 2890.393714] R10: 00007fff6d9370b0 R11: 0000000000000246 R12: 0000000000740080 [ 2890.401002] R13: 00000000004beb51 R14: 0000000000000000 R15: 000000000073bf0c [ 2890.408815] Task in /syz5 killed as a result of limit of /syz5 [ 2890.414849] memory: usage 307200kB, limit 307200kB, failcnt 458 [ 2890.421916] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2890.428890] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2890.435056] Memory cgroup stats for /syz5: cache:80KB rss:216628KB rss_huge:176128KB shmem:0KB mapped_file:132KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:216688KB inactive_file:0KB active_file:0KB unevictable:0KB [ 2890.456525] Memory cgroup out of memory: Kill process 30834 (syz-executor.5) score 1113 or sacrifice child [ 2890.466661] Killed process 30834 (syz-executor.5) total-vm:72584kB, anon-rss:2208kB, file-rss:35808kB, shmem-rss:0kB [ 2890.480402] oom_reaper: reaped process 30834 (syz-executor.5), now anon-rss:0kB, file-rss:34848kB, shmem-rss:0kB [ 2890.538671] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 04:13:40 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = memfd_create(&(0x7f0000000180)='\x88])\x00\x00', 0x6) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r1, 0x10, &(0x7f0000000000)={0x9}) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r2, 0x0) 04:13:40 executing program 4: r0 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)="16213271d5a7", 0x6}], 0x1000000000000389, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) lseek(r0, 0x0, 0x3) 04:13:41 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') r1 = creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000240)={0x0, 0xed, "cffcbca7badae1ab762519f83f061f5d9979670f7fe3d30fb6700bd25578ee2bf18a14894172e2d190e812198f4bd8c0b9dbcdfdea154a9d84f069de7eac727f892f72b9eb5810af04309561c2466c41d442cd5fbf168417c8d17cf11cbfb0f63a5db9fdb68634e1a6539fb63dc59bba0b7ee0992e8da9ff9a7f8d34403ea6b9e4d93807bbf5032ca406b635364c705dcee71e1390b9bfe79583b1a7b8f7a2946a2d01e605aec12a30866f0a6b9aa45c9fb9a6a3f1a79092c0f1790db07945f2611071884fba109ac9cc7c4cfa9a1899985933bddd7c85765bd91348fae456a253e241e3b0d2cf15dc19653939"}, &(0x7f0000000000)=0xf5) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000180)={r2, 0x1f, 0x2e7}, 0x8) r3 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) memfd_create(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file1\x00', 0x0) 04:13:41 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) dup(r0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) 04:13:41 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:13:41 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f0000000040)=""/32) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r2) mkdirat(r1, &(0x7f0000000000)='./file0\x00', 0x11) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f00000004c0)=0x1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000640)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r3 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r4, 0x8921, &(0x7f0000000600)) sendmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:13:41 executing program 4: r0 = getpid() sched_getattr(r0, &(0x7f0000000000), 0x30, 0x87aadde088fffe17) sched_setparam(r0, &(0x7f0000000040)=0xffff) r1 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)="1dbab2cf7a67954045895da10abefe40cb3036227a53245563f0825b0f5975047683e8bf34467cf82cc91a625f35c75fd521dccad5cc9d0c071d3a0aff776cdd10feea1b14ff5af0d675d214041940fb18080fb751884c0c2dca70a5477f34fd706582e03aa5b330edde6f1ef099599bd5f5acf2c3c80f05074b332375478f9b68c0a7ff5f091c90700205b204be886cd7ef66a74b1b08f8db58855ff90b193fbaca597cc0952d16e2cada22373e8cd73d9673c5ef7bb1944fb0b5c5ef41c1daf79ebe2d48ad3eaee802296921265c10dbbca4495c6e9ba74c5338b8e6ecd962750e47061fc884b38a9d", 0xea, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000200)=""/193, 0xc1) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x200100, 0x0) ioctl$SG_GET_RESERVED_SIZE(r2, 0x2272, &(0x7f0000000340)) mkdirat$cgroup(r2, &(0x7f0000000380)='syz0\x00', 0x1ff) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@loopback, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@empty}}, &(0x7f00000004c0)=0xe8) ioctl$DRM_IOCTL_GET_CLIENT(r2, 0xc0286405, &(0x7f0000000500)={0xbc, 0x7d, r0, 0x0, r3, 0x0, 0x1, 0x10001}) write$binfmt_script(r2, &(0x7f0000000540)={'#! ', './file0', [{0x20, '/dev/dsp\x00'}, {0x20, '/dev/dsp\x00'}, {0x20, '*$^'}, {0x20, 'md5sumtrusted'}, {}, {0x20, ']&systemcpusetlo'}, {0x20, '}\\'}], 0xa, "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"}, 0x1046) ioctl$TCSBRKP(r2, 0x5425, 0x4) r4 = semget$private(0x0, 0x3, 0x0) semctl$SETVAL(r4, 0x0, 0x10, &(0x7f00000015c0)=0x5) ioctl$KVM_GET_REGS(r2, 0x8090ae81, &(0x7f0000001600)) ioctl$PPPIOCSDEBUG(r2, 0x40047440, &(0x7f00000016c0)=0x7) ioctl$VHOST_SET_VRING_ERR(r2, 0x4008af22, &(0x7f0000001700)={0x3, r2}) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000001740)='/dev/zero\x00', 0x11f041, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r2, 0xc0206434, &(0x7f0000001780)={0x4, 0x0, 0x1}) ioctl$DRM_IOCTL_SG_FREE(r5, 0x40106439, &(0x7f00000017c0)={0x8, r6}) getsockopt$inet6_dccp_buf(r5, 0x21, 0x0, &(0x7f0000001800), &(0x7f0000001840)) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f00000018c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r5, &(0x7f0000001980)={&(0x7f0000001880)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000001940)={&(0x7f0000001900)={0x14, r7, 0x2, 0x70bd2a, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x4008000) sendmsg$TIPC_NL_NET_GET(r5, &(0x7f0000001ac0)={&(0x7f00000019c0)={0x10, 0x0, 0x0, 0x2280580}, 0xc, &(0x7f0000001a80)={&(0x7f0000001a00)={0x68, r7, 0x820, 0x70bd2c, 0x25dfdbfd, {}, [@TIPC_NLA_LINK={0x28, 0x4, [@TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xa1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x101}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfdbe}]}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x200}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}]}, @TIPC_NLA_NET={0x18, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x400}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x6}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000001b00)={0x0, @in6={{0xa, 0x4e20, 0x8, @dev={0xfe, 0x80, [], 0x334}, 0x4}}, 0x3, 0x100000000}, &(0x7f0000001bc0)=0x90) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000001c00)={r8, 0x6, 0x2, 0x3}, 0x10) ioctl$TUNSETVNETBE(r5, 0x400454de, &(0x7f0000001c40)) ioctl$KDGKBLED(r2, 0x4b64, &(0x7f0000001c80)) sendmsg$TIPC_NL_BEARER_ENABLE(r5, &(0x7f0000001d80)={&(0x7f0000001cc0), 0xc, &(0x7f0000001d40)={&(0x7f0000001d00)={0x28, r7, 0x301, 0x70bd2c, 0x25dfdbfe, {}, [@TIPC_NLA_BEARER={0x14, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x20}, @TIPC_NLA_BEARER_DOMAIN={0x8}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x40}, 0x20040000) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000001dc0)={r8, 0xfff}, &(0x7f0000001e00)=0x8) 04:13:41 executing program 0: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x4100, 0x0) write$P9_RMKDIR(r0, &(0x7f0000000140)={0x14, 0x49, 0x2, {0x8, 0x4, 0x7}}, 0x14) r1 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)=0x30000) ioctl$TIOCMBIS(r1, 0x5416, &(0x7f0000000040)=0x1133896f) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) 04:13:41 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)) clock_nanosleep(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000180)=@sha1={0x1, "019563935a55cb786214a64459ae1fda1bd02d23"}, 0x15, 0x0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb)={'\x00\x00\b', 0xffffffffffffffff, 0x4c00000000006800}, &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) 04:13:41 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:13:41 executing program 4: ioctl$BINDER_THREAD_EXIT(0xffffffffffffffff, 0x40046208, 0x0) r0 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000040)) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x40000, 0x0) ioctl$HDIO_GETGEO(r1, 0x301, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8000000000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x4, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000140)=0xf) ioctl$KDADDIO(r2, 0x400455c8, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000080)) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) 04:13:41 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fsetxattr$security_evm(r0, &(0x7f00000001c0)='security.evm\x00', &(0x7f0000000240)=@v2={0x7, 0x0, 0x4, 0x5, 0x8a, "e8307d8fac10265da37a1b5738df4dcfd6cf25c498f7287675b7e079ff90a928bfb63033740b3234ed1668cb80798591669c8743b6c441ba0d504dc53f572ae9a80531c8521702d3b0cfbeee5351616cf8c586bd99280a1f1cacc98ab38f263dda61e7c4b34bf403bbe27a0123ecce0f6db7820047a858d7ec793bceda474026870d4e57f032196ac7ee"}, 0x94, 0x2) r1 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) memfd_create(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x3, [0x0, 0x0, 0x0]}, &(0x7f0000000180)=0x10) 04:13:43 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') r1 = creat(&(0x7f0000000140)='./file1\x00', 0x3) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x39) ioctl$SIOCRSACCEPT(r0, 0x89e3) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r3, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) 04:13:43 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000040)='./file0/../file0\x00', r0}, 0x10) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x400000010000) 04:13:43 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:13:43 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000640)={0x0, @in6={{0xa, 0x4e23, 0xc6, @mcast2, 0x2}}, 0x8, 0x5, 0xd990, 0x8, 0xa}, &(0x7f00000004c0)=0x98) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000700)={r2, 0x800}, &(0x7f0000000740)=0x8) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r3 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r4, 0x8921, &(0x7f0000000600)) sendmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:13:43 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x80000, 0x0) ioctl$SG_GET_VERSION_NUM(r0, 0x2282, &(0x7f0000000180)) r1 = socket$inet(0x2, 0x500000000004, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x3f085e06ec434416, 0x0) getsockopt$rose(r2, 0x104, 0x7, &(0x7f00000000c0), &(0x7f0000000100)=0x33b) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000040)=0x621e, 0x4) connect$inet(r1, &(0x7f0000001740)={0x2, 0x0, @loopback}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r2, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f0000000240)={0x288, r3, 0x10, 0x70bd2d, 0x25dfdbff, {}, [@TIPC_NLA_BEARER={0x110, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @empty}}, {0x14, 0x2, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x15}}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @local}}, {0x14, 0x2, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x15}}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x100}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x400}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x101}, @TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'ib', 0x3a, 'veth0_to_hsr\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @multicast1}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0xffffffff, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x5}}}}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8001}]}]}, @TIPC_NLA_MEDIA={0x84, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x29}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffffffa}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xc0000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x873}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100000001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1ff}]}]}, @TIPC_NLA_MEDIA={0x7c, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x27247985}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10001}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_LINK={0x64, 0x4, [@TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffffffffff1c}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}]}, 0x288}, 0x1, 0x0, 0x0, 0x8040}, 0x1) syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x2) 04:13:43 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) memfd_create(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 04:13:43 executing program 0: open(&(0x7f0000000100)='.\x00', 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) 04:13:44 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:13:44 executing program 4: r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00'}, &(0x7f0000000080)=0x44) sendmmsg(r0, &(0x7f00000030c0)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000500)="ee", 0x1}], 0x1}}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000002c40)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f0000000540)=""/224, 0xe0}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 04:13:44 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) 04:13:44 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) memfd_create(0x0, 0x2) write(0xffffffffffffffff, 0x0, 0x0) 04:13:44 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:13:44 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000b40)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x1f80000000, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) accept4$packet(r0, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000980)=0x14, 0x800) clock_gettime(0x0, &(0x7f0000000a00)={0x0, 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000b00)={&(0x7f00000009c0)={0x1d, r3}, 0x10, &(0x7f0000000ac0)={&(0x7f0000000a40)={0x5, 0x40, 0x4, {}, {r4, r5/1000+30000}, {0x2, 0xfd, 0x3, 0x3}, 0x1, @canfd={{0x3, 0x8, 0x29179528, 0x9}, 0x36, 0x1, 0x0, 0x0, "523460886c9862aacf826669ea9342beb0928de276ae1e28ee7f82d6d5ddd5ced2cfd701774095924626ed2c4b9c7ec2802bb4b0331447f15c581c7d4816c983"}}, 0x80}, 0x1, 0x0, 0x0, 0x8000}, 0x844) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r6 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) r7 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r7, 0x8921, &(0x7f00000004c0)) sendmsg(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) fsetxattr$security_evm(r7, &(0x7f00000008c0)='security.evm\x00', &(0x7f0000000900)=@sha1={0x1, "4e36827347818983913abb02ce2de9069ceb755b"}, 0x15, 0x3) prctl$PR_GET_PDEATHSIG(0x2, 0x0) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') ioctl$RTC_RD_TIME(r7, 0x80247009, &(0x7f0000000840)) sendmsg$TIPC_NL_SOCK_GET(r7, &(0x7f0000000800)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40010}, 0xc, &(0x7f00000007c0)={&(0x7f0000000b80)=ANY=[@ANYBLOB="ca4d0000de7a25b354ccd2eb49a28d13b8f121548211eae994121dbdba39cf80838b6bc53354c90189b6f96d3edc882926cf1161f1b31ac2a90c1675247982a3176970c9d35b032dca5e74f4997387ce533c4a05f285361039c322938a2f698340b76abef5032743718ef220e1920ff0e7536923ba1b2aa24d3fa77c05", @ANYRES16=r8, @ANYBLOB="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"], 0x17c}, 0x1, 0x0, 0x0, 0x40000}, 0x20040000) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:13:44 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000f80)='/dev/dsp\x00', 0x200000, 0x0) bind$inet6(r0, &(0x7f0000000fc0)={0xa, 0x4e24, 0x6, @mcast2, 0x8000}, 0x1c) r1 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x100) 04:13:44 executing program 4: r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$clear(0x7, r0) r1 = add_key(&(0x7f0000000000)='trusted\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080), 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r1, &(0x7f00000000c0)='user\x00', &(0x7f0000000100)=',\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) openat(r2, &(0x7f00000002c0)='./file0\x00', 0x2, 0x4) write$vnet(r2, &(0x7f0000000240)={0x1, {&(0x7f0000000140)=""/67, 0x43, &(0x7f00000001c0)=""/40, 0x1, 0x6}}, 0x68) 04:13:44 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x39) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r0, 0x4008ae73, &(0x7f00000001c0)={0xe, 0xd57a}) getsockopt$TIPC_IMPORTANCE(r2, 0x10f, 0x7f, &(0x7f0000000000), &(0x7f0000000180)=0x4) r3 = memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r3, 0x0) 04:13:44 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:13:44 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:13:44 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x100000000, 0x40081) fsetxattr(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="00b8af4f7c036583f06b7a00"/21], &(0x7f0000000140)='\x00', 0x1, 0x3) writev(r0, &(0x7f0000000680)=[{&(0x7f0000000440)="806d215be8cb5cc789b60002f5", 0xd}, {&(0x7f00000005c0)="6aa804386eddd9bd55bc87b1fcf3945b6638128635b6cb7cd01019545767b5b3c24e7704dbac988cc42f7218d5d4c97ab219e95bc357ac93963b0a82777f6199e55284c04a01b1a761fb9f07962dc3d745456e459b7d208ab7078f494a60e0926bb00f848b9c8408fb1bd9fe0fb6723f2598dc8c8612337dde97d6b8262a780286feb65c4a79d745763f77e10ccf681e6dab77", 0x93}, {&(0x7f0000000480)="5aa95ea281dc4556b6461cfa0c495348f17c899a235585c309d028ac73764779daf172ad0ba47d7e75708d44ee92e41653e98fefad7cb8a8ba56a1a8752a0f785755ecae676c4a4a3b216a27a48ea4604174c3bf3b257be1655205e8fd3be3f65d87d267afc0e28ef0c82038820afbc5be2c6da4a1f6", 0x76}], 0x3) r1 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000200)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000300)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0, 0x0}, &(0x7f0000000380)=0xc) fstat(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='fuse\x00', 0x400, &(0x7f0000000500)=ANY=[@ANYBLOB="66643d2abb91c2abba5a126903ad7fe655cb2441e227e14e53113ff71799aa82c2728dcc177d38", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000050000,user_id=', @ANYRESDEC=r2, @ANYBLOB=',group_id=', @ANYRESDEC=r3, @ANYBLOB=',allow_other,fowner<', @ANYRESDEC=r4, @ANYBLOB=',\x00']) accept$unix(r1, &(0x7f0000000780)=@abs, &(0x7f00000000c0)=0x6e) write$selinux_create(r1, &(0x7f0000000700)=@objname={'u:r:untrusted_app:s0:c512,c768', 0x20, '/usr/sbin/cupsd', 0x20, 0x5, 0x20, './file0\x00'}, 0x4c) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) 04:13:44 executing program 4: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40032, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x8132, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3000002, 0x132, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r1, &(0x7f00000002c0), 0xb4, 0x0, 0x0, 0x0) 04:13:45 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000180)={0x0, @remote, @empty}, &(0x7f00000001c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@empty, @in6=@ipv4={[], [], @empty}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000340)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in=@empty, 0x4e22, 0x9, 0x4e23, 0xa4, 0xa, 0x20, 0xa0, 0x2e, r1, r2}, {0x3, 0x400, 0x7, 0x3f, 0xffff, 0xffffffff, 0x3, 0x4}, {0x20, 0x6, 0x0, 0x7}, 0x3, 0x6e6bb5, 0x3, 0x1, 0x3, 0x3}, {{@in=@multicast2, 0x4d5, 0x3c}, 0xa, @in=@rand_addr=0x8, 0x3503, 0x0, 0x1, 0x8001, 0x352, 0x9, 0xdb7b}}, 0xe8) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TCGETS(r0, 0x5401, &(0x7f0000000000)) r3 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) memfd_create(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 04:13:45 executing program 0: r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x2fffe) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) 04:13:45 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:13:45 executing program 4: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x10020006004, 0x1) clone(0x101, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=ANY=[@ANYBLOB="2e2f83883dd2434e60c51aea6ccb79697c62830f11ff733a1e0807fec6b26cb3fada24a3a8e532a930a73155f8e7d7e82fcc6b06129015a5fa95563dc7648fb9d8570f3a9c586539e87bb9622b5b00d6e2a768"], &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='ext4\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000180)="3e0f8a00000100c402a19ef3460f745932dbc0c4c19d7cb10333d775e1937893660e17befaffffff3626663ea541d2827670759cc401905e17") 04:13:45 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x1ffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f0000000600)) sendmsg(r2, &(0x7f0000000240)={0x0, 0x3bb, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:13:45 executing program 4: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffff9c, 0x84, 0x10, &(0x7f0000000080)=@assoc_value={0x0, 0xfffffffffffffd35}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000100)={r1, @in6={{0xa, 0x4e23, 0x3ff, @local, 0x9}}}, 0x84) r2 = socket(0x10, 0x80002, 0x0) sendmsg(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2f0000001800030007fffd946fa283d48020000000040005031d85680c0009000602000016ccbb24e0710b42fa3ccc", 0x2f}], 0x1}, 0x0) 04:13:45 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') sendmsg$tipc(r0, &(0x7f00000001c0)={&(0x7f0000000000)=@id={0x1e, 0x3, 0x3, {0x4e22}}, 0x10, &(0x7f0000000180), 0x0, &(0x7f0000000240)="decc25beabf91c585643f2cf37a80c8d07359a993d0471b3f65917a4282f6e42dbd3cdecb7cd082d7271d691021b880eab4d907a55f7cabd1e6753db7be70b92a5dd1ad2ae62d0", 0x47, 0x8001}, 0x80) r1 = creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) memfd_create(0x0, 0x4) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x9, 0x62476047, 0x0, 0x1, 0x7e2c}, &(0x7f00000002c0)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f0000000300)={r3, 0x3}, 0x8) [ 2896.738564] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 04:13:45 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x800) r2 = memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r2, 0x0) 04:13:45 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f00000000c0)) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) socketpair(0x5, 0x806, 0x7, &(0x7f0000000040)) 04:13:45 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:13:45 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x0, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f0000000700)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_buf(r0, 0x1, 0x37, &(0x7f00000007c0)=""/111, &(0x7f00000005c0)=0x6f) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) accept4$netrom(r0, &(0x7f0000000640)={{}, [@netrom, @null, @null, @rose, @remote, @rose, @remote, @rose]}, &(0x7f00000004c0)=0x48, 0x800) r2 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f0000000600)) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) ioctl$SIOCX25SENDCALLACCPT(r3, 0x89e9) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:13:45 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:13:45 executing program 4: ioctl$VHOST_VSOCK_SET_GUEST_CID(0xffffffffffffffff, 0x4008af60, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x100, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000000c0), &(0x7f0000000100)=0x4) listen(r0, 0xdf1b) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) fsetxattr$security_smack_entry(r1, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='\x00', 0x1, 0x3) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x1000000000054}, 0x98) 04:13:45 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) r1 = request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) request_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000640)={'syz', 0x1}, &(0x7f0000000680)='syz', r1) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r3 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) prctl$PR_SET_MM(0x23, 0xa, &(0x7f0000ffe000/0x2000)=nil) ioctl$SIOCGIFMTU(r4, 0x8921, &(0x7f0000000600)) sendmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:13:45 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={&(0x7f0000000140)=@un=@abs={0x0, 0x0, 0x4e20}, 0x80, &(0x7f0000000040)=[{&(0x7f00000001c0)="335e540860520a56740c7d56c1994a621de0bab5f9b8cd68f7ec61ad60aac734e0fd6804fa2a12c46f5ae5a55ea956797caa594a6b57d4bafb7ffe5b17451b7c3938a8c86fb588030854bc7d94c2f99a7e3d6f1a80e1dc87ba5ca54bc28ab501bbdf2145d8a35b4103ca185229824bd94a90b782825c21df0bbebe5f12ee1ca5f339883f900823d4a99fb0588096b648eb959e200df8b872418be63a638904eb5ce1627a486f", 0xa6}, {&(0x7f0000000280)="0da2288525d28e0b385615fb71529c303448766cc52dc8593fadec01b81966ca94ffeaf24f508c68847ee1ee6dc2c3565eec4bfe838b8b4958416d846400007f6fa06313d25db2253276cbcbc494ff8ab52f53359aeef087ec25b6f2c62ac5b8aa509881f1b449a44314c64885eae7e3fa1fb0d3a031201a440b32b880b684c5416639f2d6e93e16edcdd02367d68967ebd03f4ebc4bd855c10110918751e0034ec8f0d8a0df3fd1bffbb1999862fc7a50cd976f076f043efbbbe48b0e26cb199f73f8355179637d7488dc9c794bd06c134370a71531b34594dbf2a4", 0xdc}], 0x2}, 0x800) 04:13:45 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 2897.216232] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 04:13:45 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) ioctl$SIOCAX25GETINFOOLD(r0, 0x89e9, &(0x7f0000000040)) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) 04:13:45 executing program 4: syz_emit_ethernet(0x4a, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaa00a29ab0893fde86dd603f3a5400142f00fe8000000000000000000000000000bbff02000000000000000000000000000100008100", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000700a74457"], 0x0) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=""/183, 0xb7) fanotify_init(0x4, 0x1001) r0 = gettid() sched_setparam(r0, &(0x7f0000000000)=0x2) mkdir(&(0x7f00000001c0)='./file0/../file0\x00', 0x105) 04:13:48 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) r1 = fcntl$getown(r0, 0x9) get_robust_list(r1, &(0x7f0000000180)=&(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)}}, &(0x7f00000001c0)=0x18) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000200)) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) 04:13:48 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:13:48 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f00000001c0)='./file1\x00', 0x40) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x39) creat(&(0x7f0000000000)='./file0\x00', 0x0) memfd_create(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 04:13:48 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f0000000640)='\x94\x9a\xcc%\xf8D', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f00000007c0)='./file0\x00', 0x6, 0x4, &(0x7f00000019c0)=[{&(0x7f0000000800)="338900421a79c3a1ca42a3b2e1304a66b9a5e9eb6093d275053df5e9f25d6e759fced37a7bf62721e1d5ed9111cacb880fd0214a28897dfe9e6edff8db2672380cd8ffee1fdc92ef811c04d1254cd1dca62a51cba23effe5e69bedb0f2d318a98f9378539851a6c63241532d7c6b3294605a07427ee0e1ba", 0x78, 0x5}, {&(0x7f00000008c0)="5d03c8ee3cf786e7eacdc7c32f8bb9f0eea4b44dca340cabd7bee89daf430162a3bcf1cb1bc50ca36f88c99753a085ea5284251174b3173a5d1b56237422c584efd97a994530895ce21cb4c9b0a3785a5658b01a5a7ce9f1b048e35764a1a86f08ea5284d4361fa86945cac9b98eba677e193a40a43f5fc2e879eecbd9dcf10d77a9a7cf45b1e718065bc6d9cc549cf3194dff3bb493a7eec8f4b6d20d421a1da54bc1ce3e50b508fd052906784d2cad3f0ab79220f9466083e35b5baebc80866ae7599aa8a72f206bf6cfa85826d42e47881bde31c0644eb815eae76c984c5948118ca4066472f6a206fe06b983611f5457e83d7b40d754c1325a744ad04c2f0340331237aa81a5a97315e1e65541ea26082515de86437bf037aecbbb7d567431ab5e38ce10e023c641e46eac9497c7f4925990af83aeb6ba9ce633a19581cb82b1ba8d7c31f41cadc673695da125c51f12b8fc2b93a7d0565210f47cae0ce7fe6960c3937b253f560e41bb9ad2403d1d62772570961398811a46002be9c513e9414e46dad9cc88066243bc602bd18b1edc51752e2e02debf84f7876e6621c2ebb3e0b38d76a3922e7258a3704dcaa43f62b9358ff560daff8efe37633d7016909d8145048ca0004a607cabbe44b6c213e04719a5c6967cde481c4c7e50174c61d1885df8ab840618fab99dc99de2b212eefb77049936e8fcdffce7f816f2d7be232a63b87167f935961fec86149bd53ed3617d3bc128804317530dbd0dc87af7fe071434bb1933fc0d3b80f0084e331b5cfc29db0c10c509622e94607fac4056880bac28012a75e8fbf014af0cc7152bddb8fc0c5c12afa3c44635ec60a282c9e701f5f3b27b929d1d153f7f369efb8bb3b62bf8a027fdfd3eabf1fe9b35e3f90e2e92ea7c3982214ab29aa0b0d418970f52c3f9f2132aa45d85b8df26b0c064987597a5b88ae4fb734da82ae7c1771a9bcd3b2f766853db12cabd4419bdd28f92e78d6caf9dca1fc958b8c61ea5ee2fcbdd2685634e8879382c5688af512d6cbab08ccb8dde9dd7a422e8a11a433099600d3cf19f994cfbcfccc7dfe3bb88fed3bc39c8baa133ed25e6753524c431e175b54a5cfed1eadc91f1cda8079b06bd976e0a256be2947713bfab34913b0f0212dd39d49909d149e7f5a8183d619744a700028d4d03b2cc0768e818c19f00973ec586ec0055eba743703ae5fc3bca565ef0f0a78e01bb23b8a62c8b2e4bc98beefcdf7b372d6bc94ce9d1bdd6abd0a6eaec843bd8c3ed3ee1ac578595622a76529ede169933f41f087d532f217c56c9519ccef4ee0ec1f017c7e35904eccfd31c95a12b4d88e0370b68ca5637cebfe07a5e61b754b5bf611ccd648f8456da3507b857247f481ee566ca83a28c328e307e11b80051ec55ebbdf58d815a3b700abe30dfbacd6c9e21cf2c904fc2dc2ee37a149ab39431c8bf54723d14aa88fbebb7094c2f2894a0c2ec5d4ab2a53b55ce63bbbad6fdff1c4b583db0125ecaafe604b114d0bce7c0dc935f3dfb4cde9de18a70d5e459a022cc0284be45fbef7385401e059bc436ff92c8ef60ff0a985d23c2a27df854f98b82c730f64f80d27a9eb8dc2bb1cf0e45d376c6643a53a842c89202319a956b2a7905ccd9da0c09c62ca314c7914b9ecc4f6d760dd732d6b9b281ffc7df400e1bf00f1d2d60f737a734824ea82b069db186364db344fc87b5b7d4118854a6df26fe4d4be800f5335a7397a55601de52b3fd0d0dcc00c46850e9649aa2d45e02696997006b3476a4c99e83410baa137c91b27175d4b4311a9f088055d59745b267126f775778103af7cab1b644111ce80dda8911b756d27d178dd24476fbccf3b46a1ba5236858946b20ab89401e2586785478aec560638c366a97917ca1af59bf65fe7c01583f7c78feeec762747ea69cf298ca64a20084ee474279e6bf3df82425783d2485c33b7ad3d90dfe7cca3fd51c7394d8fdeb878f110cc30297946385589222faf67663aa55a5ccd7cba467b4116eade5163ba34e6d2da5a21595fd6bd4b8558ecf76326ef87708ebc7352cb65f604a022a9bc28e062473f6362cc2c1692d63d8e28fc512a4b4b48dc08112a973e81e09beabc5da44601ce12fc4cc9095aa65926263eedea38742b03b07522271e6ea308db0cd6e1b3a5236fab8d56ca87954cfd9a001eebc9d2280222026e9737b39ce8f46d01b7229126d99c7db4a29a8eda03cadacb21e462969f544ebd81a349f47af9ae6c4e9326489920b7a7236490530209bd497f49a764c4a0d4e7b8e928fcbc3356d60f212897af6a64765f065d5df0e2afb6fa5508fa80f53ddbb1083c2f0c9c1190add8f94e4fc7ce68a2e5924a737c89a6d93c32193be7e554019b8d01e47d4134435c57ab0306cc633b7962df3e106af298e8b3241664b948f33c319549968d456309af50040c0c0ae7d8f579a83fc156146e35024c5457195372f919d2c8ad18ea5a7e64f222bac8bae3fc1f815c871f17d5827ae2cce911cfd0cb83cc4381ca060a24e22f14a2343328e144a27c45801f16ae37d3d97695ba3f62d98cc6155b8c3ce26762602472536bf633ac4c2a044b21880134ceb7bd9583674ee65a4fd9617b8e8fec7f8ad54701ba0d3bd546485482b3e0e9d0e9c2de3ac1eba613b3bdd17496f0e92fc7561ea06e907dcfe2d3811a9569a96dfb322ef011c2cb18b428941eac68a75030748d6b5a62b485e2c39b667cfb20983f53a03dd1f840ac4fe0404253fc243173eba3e95b9295dc34c1233fc28ef2ed709b8cb82fbd0f365f4f66c0872f27e5f70ba0871e89e18d4e2a8303d9972cb7f95dc22126855850a8b276e09e5e7b929cbca285a2a88148f352733717eb1f48ae0befa5c24d834b916df1e23fa3d432a3965d4539a87b3f7a61418698e15571d0083a37c913ee6e9525f2564601aa9ff58d38806ce0f289273fa6c785be6f839acba0d55c821e6899de5a4cff9b0d7187b1183bdc9d6515483a11e5a6924051a1b1f3b5b4b2d848ac280bf9a6138c6727b45a6387cf85a6329f77b39ca922fb8e6e8dc24d5784dac199f622317ef627229ddcadda258d95e3e61cf6b53bcce61dc227d75fd56c62f22166b1af161be83f52b84080d3f20df5bf29e7b718ad09293cc4ccd617d5ecb243f25bc761e96763cf91da16109fbefd49a47fbb181465c1a803dcb62b25f31dfc037c42196eeb109c43646b99f1d20781fea8f9da3660e69e482f978715d28d46aedad22af1ebabd9754284f05dfe3e3a56a51646189d8ba6d29eda834ef874ed7af0d6aced617cc7e12fb17143bfc4a99427589265f1b9490021aa4fb9af92019a152c77e12a4c45afacf4edde9577b1b3ecc7e267e6835791d3bfa8e0f6df5e4436c7c5a6e285d4dae50a572f1dd8bb3eaa3179fd030ce1e3bd4d14859b01bedc5a1aff19576de1da73f5f993beef0ccb8e23763dbde4b81133fcb08fdd7f4561ab8691bb57cb64c3d1d49baaa2ab56b41aa288f6f5ab1d8d8a3c36f7a5bbc723c0e89038645f37ed336d53d7b8c0435e87b570dfe4a982bfb3acd13953d7816840e8627854ea4f036e4f6ab108c6b952806772b19e3ec0ca156cac4641b247c442a51e1bba4c9a87a3c22d635aa3a0866159d51862773881a50f8436bd3da50aedd43e3c0f992c3df128cc109d12f7f154880354d6cf4ee907b519d1ec623b8a2275c42502ae5bdeb2da2b88acf21538a2004bb08f262bfb71fa7829700379a3e3909c151b8ce09cdb8c3ad85b6820d4dd182d4786fab01ca3f8e8c5c443cb1184bbdc19e290456250ae3f9dacdaa87652188a72a4131eb7270614522d9d4949bb2920e7c57efcf3fdc151c5c817812b083dc6e35d09bf2a7884ace456dab7505a3e2ef02eba05711549b1dd2a45237ac06a0b8bc6d2ed0a2a8af22e9952c6659ff6bba7f272762099e93a772d49f4881d8cb558961702266343abcdb33a2d7af1a6835af0e0f7115ae95eaa3bf0ec3f7b6b421734e711576dbba81a259ea5fc4dc3433c7c321912a7b59f332406d214b605f8a3fda7ad08e42c4ecf2e892674436de6ee757302a344a1b6fbd96e60e483fcbc350ba0f68b6639e00e15f390e01add02376c58ab7e7072486667aa6a2eba29a939a0c26f8f675ecb235d48d311bb7a058eb44edbefde153c988a7dd7e26a1721cdd33b90671c9057ef2fbe64cda2da09b4cef9c2bbbc14d4b9d9ef4126019d91177b1d00c0b3a6a258a5265bc7f2dde4b97921d4a424dfb3cabd12195181d42b220d009dc2be29cf5ceed9118d85bf8352f9a8ad50f0142eb11da61e44891634698cba93aa1d4a6907f662ab900ebf380d240adae3fafeee5e7909ee381d8a9d89060e7e714d81d10465f324ad181b93b6767cc444c4b18350da68fd2db1cea327e5fef1ccbf88eef31ab56f230d287e4d8e4cbb1b485eed4785e7dba6dbb61f752d363d181ff0e7f8be1132b3999218667196289a5d83ad4aa1b679f239ffe574aea4ea407e04a905a40cb557f2f855a8c2ccf060a8336f5846553a27a9bededc5e0327d394e7e7290ac6080a683e3c247c3f0a4341482904d144e716ddfe9a98daeaf534a6344e54cd438324b6adb2bca46bb9ec4cee8f0db0c5fb28e020156ba4394e789d1d95781e88239e1d5dee1db24272ee60fdb77c37975f73a610323776086fd45714765c4e66ffd97dba0e09d879ae917b7f10311f879db3ddd5928516e3254368a7e34539205a48763c7abc331b7f83bb0f6efb59897de51713976a895376fedfc6e02ca3a0ce9d247d66a59a5c1f8bb5e9f00c4d0f4d8cafb281145490632e5ee42ca071a352cd4d6f111066144798017eab23e99a40be1eebb94d4d82fd9645f5add2d947b2c7c57d2c51a6c7b792061d47dd0c86217b5deb9c53506fd5e48cf6f29dd16cc97d95809d444f50b67c754bd3b0877bba8c07146347c562ba708d21463f08622501e3d02606f1866965b6feaab60f27623d5e6fd7637f03fb213b0801ec5683e7a6a2e5bed9ba70191c9dc9b62ff5f67a8db53f2bc14952b98f8ec8ece72a9c54f24dbfc4f12138c41be93bce403b9f8cf1770ed17916e93a52482dd7b5577b5f9081b28f1bb6fb875a132c62a0575281ec1c916e87ccc0de3dad8a6c5dd47b16f3a4aa76810336b477130e77fdc2c1e557a358d6e3503e063cd61ef1f67ee89f4c3bd7cfa51f2f746e2d4d4295aa6feb7057eae8271ed4959529e27301270e4768c9b2a23fca01d7c247c956883bd675648678950240a894771af51052927bb92e93dc292a901b8b1e336a3e7875ad13a533b505ca7a8c78c66d6d3491d1ca2f442e1f7ae4ddfdfd18043a6bf7f572646ef1c954d4abebd6e77a50044eb2b48f5535b408aa307f6493549a60583180bb815571c20cdcd253bdf484f2c0f5fdf0d2cbe15397f05395fac7b7cdbe2c11b332f0e848afec167d7a4037908b83beb443af29cb75e4d0c58740c73b887b52a43fc0972e2344f5741477b89481287af09f3a0abf20ca3fbf3f3b550693e533eecd13d6d1ec99730b1b9b895ac654b29b6311a162bf6cfedf81bbe650117e1c9c7d11de6cd6884472ed0600828bc604a851bcd2a71b329e5840a498eddc9a94f36e7c611d2b833100b78927e60a290a6399d1fd1e3f6e60344a610b015d61dff858e114f08dbaf339da02500ab01bd87a610454c56bdec2148a3518812e2c22784e3fe76cc877db84330da20d453fa83a39dc2e2afb9c637ddcf4c23d00d4e42fed40d207691a0653f18a473831b4fb0e4", 0x1000, 0x7}, {&(0x7f00000018c0)="ed8f9d8457a3ca08a07f73f29290abad4232c1df6c6204113a70316ef3a36558c2478faed9fb2e5fc12a3768d3a89dff2009f52a38", 0x35, 0x81}, {&(0x7f0000001900)="36e0201ee2dd89a779308a5de65cc087373bf4e08183c21304a263c7ce8d803256d9ef45759c98655e1b40271e32a79a8a75117af839bb79ccdbd2e2fa0ea23d20f9e960978a0d9de47e0b4f31b5a63ec10dbf5db10e6b247b1989808f2f2206247b813b5f125b8cc1e6216f2b8d06e7d64ad0a6962f18036011c2430a0ba0fbd3f51671744f5b51ff74", 0x8a, 0x98c}], 0x80, &(0x7f0000001a40)={[{@dmode={'dmode'}}, {@dmode={'dmode', 0x3d, 0x101}}], [{@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@obj_role={'obj_role', 0x3d, 'syz'}}, {@hash='hash'}]}) listen(r0, 0x1f) inotify_init() perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f0000000600)) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) ioctl$sock_x25_SIOCDELRT(r0, 0x890c, &(0x7f0000000680)={@remote={[], 0x2}, 0x7, 'veth1_to_bond\x00'}) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000004c0)=0x400, 0x4) 04:13:48 executing program 4: socket$inet6(0xa, 0x4, 0x101) r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x201, 0x800000002009) r1 = memfd_create(&(0x7f0000000200)='#vmem1\x00', 0x0) ioctl$CAPI_GET_MANUFACTURER(r0, 0xc0044306, &(0x7f0000000000)=0x89d) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="2df39bb75c387f7223d83e4c4952db95bd3fef87cdd726bad3e96cd37d2522f0387998b3c01e4b142e979f9fe51c0a91784c152b2998947f8ae09ca7c758973570ec3dc586e73e1b91f0378c102fba0cf461a7757fc8909a5a8588d53b4a8d6cfeca4a8deece9069107323e0ee532a11f13e1c32f077bb5e11f447b4848983de3145edc0744e57c797486e3fa8e8ad400151334a2daca4cad33ead6f34ca9ad82b28d816f193f4e14df515ed52ddeaef9a25e32758d8cb5c8254942ee08ce688bc60b8a19ba80f3fa1f3fc5c716b901eb36065424c0e5ad37a60058756b419fe37c006b0a22d7f000000000000000000"], 0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000080)=[@in={0x2, 0x4e22, @loopback}, @in={0x2, 0x4e23, @empty}, @in6={0xa, 0x4e20, 0x1f, @dev={0xfe, 0x80, [], 0x21}, 0x5}, @in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}], 0x4c) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045519, &(0x7f0000000040)) 04:13:48 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file1\x00', 0x1, 0x5, &(0x7f00000003c0)=[{&(0x7f0000000240)="0fcb19a259f521fc080bdc56cee32d41d53b26ca97a6905fc0105b1096b4fe70bab581a2a1847f5f543afdd8a0151e0bc99e13f30348d6f1a6cf05b441ab16beacb9acb5446917ad4cbe5857affde4a701c813aa4f3d069d132f0bb1d02d8bbd20", 0x61, 0x7}, {&(0x7f00000002c0)="605b100ee84f3b87bb0fcde1c6016606ac9a24e8d1b1d7812cb412bca55784b1a9b167aaab215880ec75d94f71d44e0052f2d426cf4d214e704ce42d79ed39de350902d337a193608aa2fedc660dd8611bd594804cf1800fef8b9fb933d2c5fd70361ecdfdead070025e55a0743c9d3b141defa58d4a13358d44bc6fe8082261", 0x80, 0x6}, {&(0x7f0000000a00)="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", 0x1000, 0x8}, {&(0x7f0000000340)="cb86d58fa8e9f8de6a69a758895915599e48f5c963cd77f6ca96594e71f498fb8defe2fc4ccad0a7bb38aba7ab35bdf0b7e534eaf76e134eb42bf747ea205c0ab032fd026c9b063e0ea3f04f1ebf99c1015891931683a0657f5bc33c08faec", 0x5f, 0x1}, {&(0x7f00000001c0), 0x0, 0xfffffffffffffffd}], 0x200000, &(0x7f0000000440)={[{@statfs_percent={'statfs_percent', 0x3d, 0x1}}, {@noloccookie='noloccookie'}, {@rgrplvb='rgrplvb'}]}) r1 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r2, 0x0) 04:13:48 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:13:48 executing program 4: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) listen(r0, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x800, 0x0) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f0000000180)) syz_emit_ethernet(0x74, &(0x7f0000000100)={@local, @link_local={0x1, 0x80, 0xc2, 0xf0}, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$clear(0x7, r2) 04:13:48 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000140)={0x80000001, {{0xa, 0x4e20, 0x40, @rand_addr="ed99eadd77df1c0d460d3e08a0c5cd37", 0x4}}}, 0x88) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) [ 2900.281514] net_ratelimit: 2 callbacks suppressed [ 2900.281552] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 04:13:48 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 2900.360621] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 04:13:48 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$bt_l2cap(r0, &(0x7f0000000100)={0x1f, 0xffff, {0x3, 0x3, 0x10000, 0xfffffffffffffffb, 0x8001, 0xff}, 0x3, 0x2}, 0xe) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000140)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x5) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) ftruncate(r1, 0x4) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f0000000200)) sendmsg(r3, &(0x7f00000006c0)={0x0, 0xfffffffffffffe82, &(0x7f0000000200), 0x0, 0x0, 0xfffffe4f}, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)='trusted.overlay.opaque\x00', &(0x7f0000000680)='y\x00', 0x2, 0x3) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) accept4$alg(r0, 0x0, 0x0, 0x80000) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:13:48 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x80000, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) 04:13:48 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file1\x00') clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x39) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$VIDIOC_CREATE_BUFS(r2, 0xc100565c, &(0x7f0000000240)={0xf3a3, 0x9, 0x13afd707efced64, {0x3, @pix_mp={0x8, 0x90eb, 0x20797e5d, 0x7, 0x2, [{0x9, 0x81}, {0x8001, 0x54b5}, {0x7, 0x7}, {0x1000, 0x5}, {0x2, 0x8d}, {0xe0, 0xf8000000000000}, {0x0, 0x9}, {0x6, 0x4}], 0x5, 0x9, 0x2, 0x3}}}) r3 = memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r3, 0x0) 04:13:48 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x8000, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) mount(&(0x7f0000000280)=@nullb='/dev/nullb0\x00', &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='fusectl\x00', 0x0, &(0x7f0000000340)='+\xbezsystem\x00') r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/zero\x00', 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x6) ioctl$KVM_GET_FPU(r2, 0x81a0ae8c, &(0x7f0000000440)) r4 = creat(&(0x7f0000000240)='./file0\x00', 0x82) write$FUSE_INTERRUPT(r3, &(0x7f00000001c0)={0x10, 0x0, 0x1}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={&(0x7f0000000700), 0x2}, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$F_SET_FILE_RW_HINT(r4, 0x40e, &(0x7f0000000800)=0x303) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff55f, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, r4, 0x0) setxattr$security_ima(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='security.ima\x00', &(0x7f0000000840)=@v2={0x5, 0x1, 0x9, 0x10000, 0x11, "4465bcd9feacb671a3e9980e1adb79ee31"}, 0x1b, 0x1) lsetxattr$security_evm(&(0x7f0000000880)='\x00', &(0x7f00000008c0)='security.evm\x00', &(0x7f0000000900)=@md5={0x1, "8b4e88c2fb93debe1641daafcd5b89d9"}, 0x11, 0x1) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000380)='ceph\x00', 0x0, &(0x7f0000000600)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4') bind$vsock_stream(r4, &(0x7f0000000680)={0x28, 0x0, 0x2710, @reserved}, 0x10) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r6, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(r6, 0x0, 0x0, 0x164e, 0x0, 0xe8) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000003c0)={'veth0_to_bridge\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r6, 0x8933, &(0x7f0000000640)={'team0\x00', r7}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f00000000c0)="66b80f0000000f23d00f21f86635000000000f23f866b87e13e8ab0f23c80f21f86635000070000f23f80f20590f73d600640f0766b93d0b00000f320fc72cb800008ec82e640f5a4700660f13890000", 0x50}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$EXT4_IOC_GROUP_EXTEND(r5, 0x40086607, &(0x7f0000000740)=0xf2) r8 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$KVM_RUN(r8, 0xae80, 0x0) 04:13:48 executing program 5: r0 = accept$inet(0xffffffffffffff9c, &(0x7f0000000700)={0x2, 0x0, @remote}, &(0x7f0000000740)=0x10) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000780), &(0x7f00000007c0)=0x4) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f00000004c0)={'syz', 0x2}, &(0x7f00000001c0)='\xbdbdev\x00', r2) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r4 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r5 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r1, 0xc0845658, &(0x7f0000000640)={0x0, @reserved}) ioctl$SIOCGIFMTU(r5, 0x8921, &(0x7f0000000600)) sendmsg(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:13:51 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') r1 = creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x39) ioctl$VIDIOC_SUBDEV_S_FRAME_INTERVAL(r1, 0xc0305616, &(0x7f0000000000)={0x0, {0xd08, 0xffffffff00000001}}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) memfd_create(0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000180)={0x103ff, 0x2, 0x115000, 0x1000, &(0x7f0000ffe000/0x1000)=nil}) write(0xffffffffffffffff, 0x0, 0x0) 04:13:51 executing program 0: r0 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x5, 0x400) getsockname$inet6(r0, &(0x7f00000000c0), &(0x7f0000000140)=0x1c) r1 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)=0x30000) r2 = add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x2}, &(0x7f0000000200)="85881ee14c1fb3acef3b9a96b326affaee9d2b215b8a47bb709317c7bd894846139d26c75b03a3efd609f8a68f31b9698de5f8b1b59c59771db87b4cd3a2fc865a61e6788206ae3ebb2b52b8a119fe8eae5d9fdf464978a77f466d0b3744f053e89073388aa21b9af976cd0b2ad1d9ed7ca278e8a470c4b5eb982188132e1cd2e885042c00e685111bcb867eb329d9e2efcebb2d162d0a67769020d8c17a2df339130cc1e3869a503e579b9e2684329ccad83d3a92eee5b195efc56e5f769dd53958419756b555fde5ae68f6bc974ba837d26bbbcef338f19fc7d8ac12ea9daef914e4aa3bd49b48567718f5032a0927aae7729d", 0xf4, r2) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) 04:13:51 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:13:51 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x15f) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='illinois\x00<{~S\xcc\x9c\xd8a\xe6G\x11\xdc\x7f\xdck-\"x\xfc\x9e\xda\xd2~2\xb9\xf5\xe6\x83\xc3\xa4j\x16\xb0\xc1k\xb2P2\xa8\x97\x04\'\x8c\xf8\xb0\xafM\xf8\x91\xa6\xb4\xb1o>4\xa6\xaf\v\xbb\x1e\xd6\x82\a\x04\x9f\xc7\xd9?J\xc0\x84\x9c\xe2\xef\x17\xeb\xd1\x955p\xb7*\xa9y\xd2I\xe8\xef\xfeX\xe7(\x1b\xa7]\xb9\xdf\x0f\xf6\xc9M\xd6\xc8`\xa8\x1a\x05\x94n\x7f\x8bp\x8f\xa5>u\x03\xfb/\xb0AQ\x17c{)\x87\xd9\x83\\?\xefla4ty\x91\xd7\xee\xe9\xcc\xb6\xcd\x9d\xb7\x15\x82\x9fwH\xc9A\xed\x99\r|\x1d\x85\x15\xb5\x8b\x13f\xcd\x1e%\xb1\xa8\\\x03u\xae0x0}) r2 = getgid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0, 0x0}, &(0x7f00000002c0)=0xc) setresgid(r1, r2, r3) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x680080, 0x0) mknodat(r4, &(0x7f0000000340)='./file0\x00', 0x100, 0x7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNDETACHFILTER(r4, 0x401054d6, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x8748) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r4, 0x6, 0x1d, &(0x7f0000000380), &(0x7f00000003c0)=0x14) 04:13:51 executing program 3: r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') r1 = creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ioctl$PPPIOCGNPMODE(r1, 0xc008744c, &(0x7f0000000180)={0xc2ff, 0x3}) ptrace$setopts(0x4206, r2, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r2, r2, 0x7, r1, &(0x7f0000000000)={r1, r1, 0x5}) tkill(r2, 0x39) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, &(0x7f0000000100)=0x5, 0x8) ioctl$PPPIOCGNPMODE(r1, 0xc008744c, &(0x7f0000000280)={0xc2ff, 0x3}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = memfd_create(&(0x7f00000001c0)='\x88])+\x00', 0x3) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r3, 0x0) 04:13:51 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) r2 = request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r3 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r3) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) keyctl$dh_compute(0x17, &(0x7f00000004c0)={r1, r2, r1}, &(0x7f0000000640)=""/139, 0x8b, 0x0) r4 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r5 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r5, 0x8921, &(0x7f0000000600)) sendmsg(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:13:51 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:13:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$sock_int(r0, 0x1, 0x1, &(0x7f0000000080)=0x8, 0x4) connect$inet6(r0, &(0x7f00001cd000)={0xa, 0x0, 0x0, @ipv4}, 0x1c) r1 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) 04:13:51 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1001000008912, &(0x7f0000000140)="11dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000fff000/0x1000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000180)={0x1, 0x0, [0x10000040000021, 0x9]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 04:13:51 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:13:51 executing program 0: r0 = open(&(0x7f0000000180)='.\x00', 0x4, 0x10) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f00000000c0)) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) ioctl$KVM_ASSIGN_SET_INTX_MASK(r0, 0x4040aea4, &(0x7f0000000040)={0xfffffffffffffffd, 0xb6, 0xfff, 0x7, 0x3}) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) 04:13:51 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSRS485(r0, 0x542f, &(0x7f00000004c0)={0x1, 0x5c0a7257, 0x80000000}) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r2) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r3 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r4, 0x8921, &(0x7f0000000600)) sendmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:13:54 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x9) unlink(&(0x7f0000000180)='./file1\x00') r1 = creat(&(0x7f0000000140)='./file1\x00', 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f00000001c0)={0x0}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000240)={r2, 0x2}, &(0x7f0000000280)=0x8) clone(0x2002000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) memfd_create(0x0, 0x0) tkill(r3, 0x1c) write(0xffffffffffffffff, 0x0, 0x0) 04:13:54 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) setsockopt$inet_buf(r0, 0x0, 0x2f, &(0x7f0000000140)="aacd0e5de3d7242f24a78b25d1230517154944647a3140de2c785e5c73b29690cf8a0b1abe64a87f505d0ee0c97931567d2f0ef626c95b8c2784a9aed203b1d1d625af20ad982985bea92efa547977bc61cbedaa7f7a8297", 0x58) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000040)=0x1) 04:13:54 executing program 4: openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x0, 0x0) creat(&(0x7f0000000240)='./file0/file1\x00', 0x20) 04:13:54 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:13:54 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', r3) r4 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r4) keyctl$reject(0x13, 0x0, 0x0, 0x3, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) prctl$PR_GET_UNALIGN(0x5, &(0x7f0000001ec0)) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r5 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000640)='xfs\x00', &(0x7f0000000680)='./file0\x00', 0x401000000000, 0x9, &(0x7f0000001c80)=[{&(0x7f00000006c0)="f86f2e5161c62eb8556ee04f92261baad56970d7c1f59e366f2df10e4be6495ec8c71113d59f0addeecc16941e2b615d01873af03ba8d4c10ff56e3cf4e8e801cce0ccc65c5c7dafaa54e6ff21feecd1819ab1a61a5a641979e2f2e0388d2d4be95539887bba917a492b9a4e6fc25866bed2ba8d2cf3b8571029fb40069f0cd26fe6f9", 0x83, 0xfffffffffffffffb}, {&(0x7f00000007c0)="4eb70674724b4a3f8faa143710d640707a8d91cbc36ed710aac9737d8f5f075a9cfd8954bc65d71203860530f1e0eaf76d00ad6064458e39f8773ca87ef27c762003a08aa229af8d48b596c0ae8198f15cc46bc4bce13a9cbda7e72e3a4fa8711e1529319cd9f777fe04e52411a8953d17ea931eee312f5c0f9d221fbe79e4806c916d9ff1e05ef35d8933377912e1b0797c1018d9282a3ec17a1729610dff2399f03504370f8937b424ad7b5fba31beaa", 0xb1, 0x5}, {&(0x7f00000008c0)="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", 0x1000, 0x8001}, {&(0x7f00000018c0)="84534c98f06e6d780b4150264a50e85fd96c5408249c7841f153892523ff9008cef4ee8f5046a905e17401628dcc62f40891c94e5c52b20b1f6c2690482870ee578a9089b176fb820fbc9a30734edd54155c6bf124214d8dd91a44c701977826e934ada70c3a74fbb641415ff51b38c38bac80dc3da6fbeb53b81912893c4f2641afd39469c8ba7e574f498f2b6968604c075a2c0144b01910a32203df2f46ea62464606", 0xa4, 0x6}, {&(0x7f0000001980)="9d5d00e5732e5de4782cf956b55188d4ff92", 0x12, 0x100}, {&(0x7f00000019c0)="752ce0aae9184d657c9788920ac27b9a04e0e5c7746be477f19a08fc34f76046494c045cd32b63193f0b5c5c8f905ba65f785399ca", 0x35, 0x4}, {&(0x7f0000001a00)="32a2f0dfd53f3374ef7126664d82f900048dbe9e7089d8063449c8c757615c357e394216b9df05645921a4b1c1f410b53fa71fcc5f1cadbbc14018c1266f2af83a764b4e59e56624b794cd2210fbd2d524776f696a04ed2b66a3218635f8086561596ab5b4b43093b6955509b64477c07d63ba6fd6f01c210e6d9ccfb9781ecbe404232179c3f36ec2f784fe84e0b33358490d8b7d9bf663371861a48b586bfc3b306b9c73dbc6a74f7604c31e4c7f0fe609e7fd8941597540f5", 0xba, 0x80000000}, {&(0x7f0000001ac0)="2f1ec80a76e6a4ee97fd69e6c62bb99943feda87bae9c395db1abaf62d8fbcf66fd9366e8d83083f75bdca41821f74e4d6d67514b0522b890a65a87c62e75796ce9d9b8dfd75165d7df45ba1d2779abe53c66dae4a1bce2abf39566dcfcc3168e93b5f060601a7607b71eed2c6603529e673ea043524748988111f978567e75afcb83b8cceb779e7c838d587f0955357770a2c6bb2f48e1388", 0x99, 0x5}, {&(0x7f0000001b80)="dde175463d51b1f309e60e655d6e86f6e3f6a607bab8d994e5118439664fceaa6474b8651d849c39ffc3c20ae7194156d62d992f1aff0a1ff4ecdb6a44bd0ac0090d8c589093aa663ff9a0b4d7ed5f52b82a4df60b6e500e7de908812cb6f2445cf93f839ad536108405aa138f2bacf8941b7180248970e03ebe3f18b95a958153c2552ad14a142dfe3b67c151599000a688e9da90906237866020108788cde4125d5f34264eaf2c6f7e940560db1351ec84ee2361fd07e8eca0c7fda7767bd03480a71898626934a657c2e9779247cb6cca21277a71e51e51157aea06bdc17c72337746d861", 0xe6, 0x7fff}], 0x80, &(0x7f0000001d80)={[{@attr2='attr2'}, {@noquota='noquota'}, {@noikeep='noikeep'}, {@uquota='uquota'}, {@swalloc='swalloc'}], [{@fsmagic={'fsmagic', 0x3d, 0x7fff}}, {@obj_role={'obj_role', 0x3d, 'syz'}}, {@context={'context', 0x3d, 'user_u'}}, {@appraise_type='appraise_type=imasig'}, {@seclabel='seclabel'}, {@seclabel='seclabel'}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r2}}, {@subj_type={'subj_type', 0x3d, 'cifs.idmap\x00'}}]}) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000001e80)={0x0, 0x3f}) syz_genetlink_get_family_id$nbd(&(0x7f00000004c0)='nbd\x00') r6 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r6, 0x8921, &(0x7f0000000600)) sendmsg(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) fcntl$addseals(r1, 0x409, 0xc) semctl$SETALL(0x0, 0x0, 0x11, 0x0) ioctl$KDSIGACCEPT(r6, 0x4b4e, 0x1f) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:13:54 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') r1 = creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x800, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() lsetxattr$security_selinux(&(0x7f0000000180)='./file2\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x3cb, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x39) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r1, 0x10f, 0x84, &(0x7f0000000000), &(0x7f0000000080)=0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r3, 0x0) 04:13:54 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) pipe(&(0x7f0000000000)) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffff9c, 0xc018620b, &(0x7f0000000000)) sched_setaffinity(0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_S390_INTERRUPT_CPU(r0, 0x4010ae94, &(0x7f0000000040)={0x80000000, 0x3, 0x100000000}) ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000440)={0xfffffffffffffffd, @pix={0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1}}) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) r2 = syz_open_dev$dri(0x0, 0x1, 0x0) ioctl(r2, 0xffffffffffffffc7, &(0x7f0000000140)) setsockopt$XDP_TX_RING(0xffffffffffffffff, 0x11b, 0x3, &(0x7f00000001c0)=0x80, 0x4) getrandom(&(0x7f00000005c0)=""/198, 0xc6, 0x3) ptrace(0x20000000000420f, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x80005) 04:13:54 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) memfd_create(0x0, 0x0) write(r0, 0x0, 0x0) 04:13:54 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) rmdir(&(0x7f0000000040)='./file0\x00') mkdir(&(0x7f0000000080)='./file0\x00', 0x0) 04:13:54 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:13:55 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', r1) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000640)={&(0x7f00000004c0)='./file0\x00'}, 0x10) ioctl$SG_GET_COMMAND_Q(r0, 0x2270, &(0x7f0000000680)) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r3 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f00000006c0)={0xfffffffffffffffa, 0x0, 0x6, {0x0, 0x1c9c380}, 0x4, 0x564}) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r4 = syz_open_dev$vcsa(0x0, 0xfffffffffffffff5, 0x7fe) ioctl$SIOCGIFMTU(r4, 0x8921, &(0x7f0000000600)) sendmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:13:55 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:13:55 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) getsockopt$inet6_tcp_int(r0, 0x6, 0x17, &(0x7f0000000040), &(0x7f00000000c0)=0x4) write$FUSE_STATFS(r0, &(0x7f0000000180)={0x60, 0xffffffffffffffda, 0x7, {{0x4, 0xfffffffffffffffa, 0x0, 0x3, 0x6, 0x6, 0x5, 0xffffffffffff8000}}}, 0x60) mkdir(&(0x7f0000000080)='./file0\x00', 0x100) ioctl$KVM_SET_TSC_KHZ(r0, 0xaea2, 0x6) write$P9_RLOPEN(r0, &(0x7f0000000140)={0x18, 0xd, 0x2, {{0x0, 0x2, 0x4}, 0x3ff}}, 0x18) 04:13:55 executing program 4: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(0xffffffffffffffff, 0x84, 0x74, 0x0, 0x0) write$P9_RWRITE(0xffffffffffffffff, 0x0, 0x0) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, 0x0) 04:13:55 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r2, 0x0) syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x5, 0xd40) 04:13:55 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000640)=0x2, 0x4) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000a80)=ANY=[@ANYRES32=0x0, @ANYBLOB="63000000802439d9ac1689f680b6239e4909342f3f8e7dc93f0dba37bafc2cde85d75eb4f5b21c6e76197963065055a5857d3e3ecf82255081e011dde732633f38ab652444c6669433ca87e0000000000000000000000000cebf23e9732a5aef80f62639d6fe07b8d5f2f7118b848c8373d587684556f845d991838ca2e1b8474c6af4c998e18fca6dd8ac796bf11af218715deeee7f2942067d023eed23b46121afa871dbeab3a225fbc3d4dbd47126539d574aef19d90d69591db2f61b196be0b05def1f616dc178cefce94b48ce98de4350dfe15338dd9ac358cf434d271900"/239], &(0x7f00000006c0)=0x2) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f00000007c0)={r3, @in6={{0xa, 0x4e24, 0x7, @remote, 0x72}}, 0x672, 0x5}, &(0x7f0000000700)=0x90) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r4 = syz_open_dev$vcsa(0x0, 0xffffffffffffffff, 0x80) ioctl$SIOCGIFMTU(r4, 0x8921, &(0x7f0000000600)) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r4, &(0x7f0000000a40)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x801000}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)={0x1c, r5, 0x3, 0x70bd25, 0x25dfdbfd, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x20000000) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) r6 = semget$private(0x0, 0x3, 0x14) semctl$SETVAL(r6, 0x4, 0x10, &(0x7f00000004c0)=0x6) 04:13:55 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:13:55 executing program 4: sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) creat(0x0, 0x0) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x0, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) creat(&(0x7f0000000240)='./file0/file1\x00', 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) 04:13:55 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x400000) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) 04:13:57 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x100) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') open$dir(&(0x7f0000000180)='./file0\x00', 0x202040, 0x40) r1 = creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x39) ioctl$SG_GET_COMMAND_Q(r1, 0x2270, &(0x7f0000000100)) creat(&(0x7f00000000c0)='./file0\x00', 0x0) memfd_create(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 04:13:57 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:13:57 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0xa2000, 0x49) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) 04:13:57 executing program 4: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/ip6_mr_cache\x00') r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x8200) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r0, 0x0, 0x2) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x1, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendfile(r0, r1, 0x0, 0x8000fffffffe) getpgrp(0x0) truncate(&(0x7f0000000080)='./bus\x00', 0x6) 04:13:57 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x9, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x29, 0x0, 0x20000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f0000000600)) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) semget$private(0x0, 0x2, 0x8) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r3, 0x84, 0x20, &(0x7f00000004c0), &(0x7f0000000640)=0x4) r4 = semget$private(0x0, 0x4, 0x20) semctl$SETALL(r4, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) [ 2910.204650] audit: type=1804 audit(2000002437.924:8144): pid=16529 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir678550451/syzkaller.8IMJnU/702/bus" dev="sda1" ino=17734 res=1 04:13:57 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:13:58 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm_plock\x00', 0x0, 0x0) statx(r0, &(0x7f00000000c0)='./file0\x00', 0x800, 0x8, &(0x7f0000000140)) prctl$PR_SET_THP_DISABLE(0x29, 0x1) r1 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x100) [ 2910.253294] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 04:13:58 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r2, 0x0) 04:13:58 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f0000000600)) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:13:58 executing program 0: ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) 04:13:58 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 2910.654847] syz-executor.5 invoked oom-killer: gfp_mask=0x6000c0(GFP_KERNEL), nodemask=(null), order=0, oom_score_adj=0 [ 2910.679206] syz-executor.5 cpuset=syz5 mems_allowed=0-1 [ 2910.684637] CPU: 0 PID: 16554 Comm: syz-executor.5 Not tainted 4.19.37 #5 [ 2910.691574] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2910.700937] Call Trace: [ 2910.703553] dump_stack+0x172/0x1f0 [ 2910.707212] dump_header+0x15e/0x929 [ 2910.710961] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2910.716090] ? ___ratelimit+0x60/0x595 [ 2910.719990] ? do_raw_spin_unlock+0x57/0x270 [ 2910.724430] oom_kill_process.cold+0x10/0x6f5 [ 2910.728951] ? task_will_free_mem+0x139/0x6e0 [ 2910.733473] out_of_memory+0x936/0x12d0 [ 2910.737470] ? lock_downgrade+0x810/0x810 [ 2910.741650] ? oom_killer_disable+0x280/0x280 [ 2910.746154] ? find_held_lock+0x35/0x130 [ 2910.750223] mem_cgroup_out_of_memory+0x1d2/0x240 [ 2910.755073] ? memcg_event_wake+0x230/0x230 [ 2910.759423] ? do_raw_spin_unlock+0x57/0x270 [ 2910.763873] ? _raw_spin_unlock+0x2d/0x50 [ 2910.768050] try_charge+0x1028/0x15b0 [ 2910.771893] ? find_held_lock+0x35/0x130 [ 2910.776001] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2910.780921] ? kasan_check_read+0x11/0x20 [ 2910.785095] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 2910.789965] mem_cgroup_try_charge+0x24d/0x5e0 [ 2910.794584] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 2910.799534] wp_page_copy+0x430/0x16a0 [ 2910.803457] ? follow_pfn+0x2a0/0x2a0 [ 2910.807280] ? kasan_check_read+0x11/0x20 [ 2910.811459] ? do_raw_spin_unlock+0x57/0x270 [ 2910.815912] do_wp_page+0x57d/0x10b0 [ 2910.819652] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 2910.824344] ? kasan_check_write+0x14/0x20 [ 2910.828599] ? do_raw_spin_lock+0xc8/0x240 [ 2910.832880] __handle_mm_fault+0x230a/0x3f80 [ 2910.837320] ? vmf_insert_mixed_mkwrite+0x90/0x90 [ 2910.842193] ? find_held_lock+0x35/0x130 [ 2910.846293] ? handle_mm_fault+0x322/0xb30 [ 2910.850568] ? kasan_check_read+0x11/0x20 [ 2910.854741] handle_mm_fault+0x43f/0xb30 [ 2910.858866] __do_page_fault+0x62a/0xe90 [ 2910.862977] ? vmalloc_fault+0x770/0x770 [ 2910.867064] ? trace_hardirqs_off_caller+0x65/0x220 [ 2910.872106] ? trace_hardirqs_on_caller+0x6a/0x220 [ 2910.877067] ? page_fault+0x8/0x30 [ 2910.880636] do_page_fault+0x71/0x581 [ 2910.884459] ? page_fault+0x8/0x30 [ 2910.888019] page_fault+0x1e/0x30 [ 2910.891486] RIP: 0033:0x4573fb [ 2910.894694] Code: 25 20 06 00 00 b8 20 39 41 00 48 89 15 ce f3 5f 00 48 85 c0 74 08 4c 89 cf e8 31 c5 fb ff 45 85 f6 0f 85 58 01 00 00 48 85 db <48> c7 05 8a cb 2b 00 00 00 00 00 48 c7 05 6f cb 2b 00 00 00 00 00 [ 2910.913621] RSP: 002b:00007fff6d937140 EFLAGS: 00010202 [ 2910.919009] RAX: 0000000000000000 RBX: 00007fff6d937140 RCX: 0000000000413933 [ 2910.926298] RDX: 00000618892ae6a0 RSI: 0000000000000018 RDI: 000000000123cc20 [ 2910.933581] RBP: 00007fff6d937180 R08: 0000000000000001 R09: 000000000123c940 [ 2910.940878] R10: 000000000123cc10 R11: 0000000000000202 R12: 0000000000000001 [ 2910.948171] R13: 0000000000000000 R14: 0000000000000000 R15: 00007fff6d9371d0 04:13:58 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 2911.138652] audit: type=1804 audit(2000002438.771:8145): pid=16529 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir678550451/syzkaller.8IMJnU/702/bus" dev="sda1" ino=17734 res=1 [ 2911.178376] Task in /syz5 killed as a result of limit of /syz5 [ 2911.195685] memory: usage 307200kB, limit 307200kB, failcnt 499 [ 2911.207408] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2911.229265] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2911.241816] Memory cgroup stats for /syz5: cache:80KB rss:215288KB rss_huge:174080KB shmem:0KB mapped_file:132KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:215352KB inactive_file:0KB active_file:0KB unevictable:0KB [ 2911.263380] audit: type=1804 audit(2000002438.912:8146): pid=16565 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir678550451/syzkaller.8IMJnU/702/bus" dev="sda1" ino=17734 res=1 [ 2911.335015] Memory cgroup out of memory: Kill process 32502 (syz-executor.5) score 1113 or sacrifice child [ 2911.351802] Killed process 32502 (syz-executor.5) total-vm:72584kB, anon-rss:2208kB, file-rss:35808kB, shmem-rss:0kB [ 2911.380574] syz-executor.5 invoked oom-killer: gfp_mask=0x6000c0(GFP_KERNEL), nodemask=(null), order=0, oom_score_adj=0 [ 2911.403329] syz-executor.5 cpuset=syz5 mems_allowed=0-1 [ 2911.410488] CPU: 0 PID: 2710 Comm: syz-executor.5 Not tainted 4.19.37 #5 [ 2911.417391] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2911.426762] Call Trace: [ 2911.429379] dump_stack+0x172/0x1f0 [ 2911.433094] dump_header+0x15e/0x929 [ 2911.436838] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2911.441982] ? ___ratelimit+0x60/0x595 [ 2911.445911] ? do_raw_spin_unlock+0x57/0x270 [ 2911.450358] oom_kill_process.cold+0x10/0x6f5 [ 2911.454899] ? task_will_free_mem+0x139/0x6e0 [ 2911.459426] out_of_memory+0x936/0x12d0 [ 2911.463432] ? oom_killer_disable+0x280/0x280 [ 2911.463577] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2911.467945] ? find_held_lock+0x35/0x130 [ 2911.467972] mem_cgroup_out_of_memory+0x1d2/0x240 [ 2911.467988] ? memcg_event_wake+0x230/0x230 [ 2911.468009] ? do_raw_spin_unlock+0x57/0x270 [ 2911.494366] ? _raw_spin_unlock+0x2d/0x50 [ 2911.498545] try_charge+0xd25/0x15b0 [ 2911.498847] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2911.502540] ? find_held_lock+0x35/0x130 [ 2911.502567] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2911.502590] ? kasan_check_read+0x11/0x20 [ 2911.502612] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 2911.502634] mem_cgroup_try_charge+0x24d/0x5e0 [ 2911.502658] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 2911.520167] wp_page_copy+0x430/0x16a0 [ 2911.520196] ? follow_pfn+0x2a0/0x2a0 [ 2911.529192] ? kasan_check_read+0x11/0x20 [ 2911.529208] ? do_raw_spin_unlock+0x57/0x270 [ 2911.529227] do_wp_page+0x57d/0x10b0 [ 2911.529245] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 2911.529263] ? kasan_check_write+0x14/0x20 [ 2911.567609] ? do_raw_spin_lock+0xc8/0x240 [ 2911.571866] __handle_mm_fault+0x230a/0x3f80 [ 2911.576302] ? vmf_insert_mixed_mkwrite+0x90/0x90 [ 2911.581195] ? find_held_lock+0x35/0x130 [ 2911.585248] ? handle_mm_fault+0x322/0xb30 [ 2911.589509] ? kasan_check_read+0x11/0x20 [ 2911.593673] handle_mm_fault+0x43f/0xb30 [ 2911.597756] __do_page_fault+0x62a/0xe90 [ 2911.601826] ? blkcg_print_stat+0xb90/0xb90 [ 2911.606204] ? vmalloc_fault+0x770/0x770 [ 2911.610299] ? trace_hardirqs_off_caller+0x65/0x220 [ 2911.615320] ? trace_hardirqs_on_caller+0x6a/0x220 [ 2911.620245] ? page_fault+0x8/0x30 [ 2911.623782] do_page_fault+0x71/0x581 [ 2911.627586] ? page_fault+0x8/0x30 [ 2911.631119] page_fault+0x1e/0x30 [ 2911.634561] RIP: 0033:0x4574da [ 2911.637744] Code: 48 85 db 74 b6 41 bc ca 00 00 00 eb 0c 0f 1f 00 48 8b 5b 08 48 85 db 74 a2 48 8b 3b 48 8b 47 10 48 85 c0 74 05 ff d0 48 8b 3b ff 4f 28 0f 94 c0 84 c0 74 db 8b 47 2c 85 c0 74 d4 45 31 d2 ba [ 2911.656675] RSP: 002b:00007fff6d937140 EFLAGS: 00010246 [ 2911.662062] RAX: 0000000000000000 RBX: 00007fff6d937140 RCX: 000000000045737a [ 2911.669331] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000a54fc8 [ 2911.676622] RBP: 00007fff6d937180 R08: 0000000000000001 R09: 000000000123c940 [ 2911.683890] R10: 000000000123cc10 R11: 0000000000000246 R12: 00000000000000ca [ 2911.691152] R13: 00000000000015d8 R14: 0000000000000000 R15: 00007fff6d9371d0 [ 2911.699873] Task in /syz5 killed as a result of limit of /syz5 [ 2911.705955] memory: usage 307036kB, limit 307200kB, failcnt 501 [ 2911.712095] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2911.719094] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2911.725243] Memory cgroup stats for /syz5: cache:80KB rss:215344KB rss_huge:174080KB shmem:0KB mapped_file:132KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:215336KB inactive_file:0KB active_file:0KB unevictable:0KB [ 2911.746528] Memory cgroup out of memory: Kill process 1227 (syz-executor.5) score 1113 or sacrifice child [ 2911.756419] Killed process 1227 (syz-executor.5) total-vm:72584kB, anon-rss:2208kB, file-rss:35808kB, shmem-rss:0kB [ 2911.767770] oom_reaper: reaped process 1227 (syz-executor.5), now anon-rss:0kB, file-rss:34848kB, shmem-rss:0kB 04:14:01 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') r1 = creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) memfd_create(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000900)={&(0x7f0000000180)=@nfc_llcp={0x27, 0x0, 0x0, 0x5, 0x7f, 0xce7, "bc442a4bd7aa7d558aaee959303f54c9cab2975a78d8d55bc9eba69f4cfa3ef0d100ee9da997b03846c3f32d54e81faeb2abf808e155327901b24c42ee1320", 0x1b}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000240)="c64ba0f1498c16af8823905b4dc72757add733f8161471771a6136df5709edb50254c403fcc66339e7cfea120c59077c699b1f5b5ad422e0a78178e38333d0396ad41df9486757bfe93878872bced1c5adc4baf9b01a6de480b69bc00c4157946389bddb3c18c35ead46e36eb2db0b8f0f41073f99ddcd6e912389579bcaeacfee94159ea35447ee7c76298c391738c9e14343f7fef9effbad7acec4fe1e1b6f6b2e50409532d274cd9340548684487b94ba49dad55be7ab3d87de207a05285ca41c16a4fc7a0b54afc719da98c7c23245086b960a80fa24d34961f05ca77b84db59b50a350e149b29bfe1167d03f00a", 0xf0}, {&(0x7f0000000340)="f6c8dc6279d113a9ded0e45f5ed856e7c53acd7443ccf3c6b745b91ea742f70c616dfb8d167a66d95c8f879612ce31f84bf3f1ecac2ecde2a4319ef206e90bfe6848598f4458912bc6f7be24b2e1ad00491e6b38ca81b8580c18fb1eb8ebe2fee29cf2eed085ea3e60e25dbcfeff898278273565977253809e7826ab6d54f5d18ee55d5c6b19511061a16158efe0626d6af1a3f34bcbed9911da44ba6af41d1f5e8e0f61047ff9105281e4f24e210a0a401f1b7286eb18382b67befdd61865617f06cd5d184c25c427c805473d9ff86811dbb60df1ac70d4dffbe7e0df92eb1fda2b4fd448771d876f88ce752f3f79b5a445d9b2965d56e5", 0xf8}, {&(0x7f0000000440)="b2432fda6320ccf3437996b40606b5ebad76423ff130596d7d79a34dfc5c46a61a8b96a575ce2af6119f8fa49d430dd06707007337602a38ae2471f33eafb758733db21b2b363cc4f2da4ad86492dd7862e5343df41d16fb05874d3ae75d3ff87071f5cfc0218014a47f09feba8e68b2ebe5038cd4476eb3a277f416468b2809b569", 0x82}], 0x3, &(0x7f0000000500)=[{0xe8, 0x104, 0x8, "a866dcaec218f9ce554896443b03631cbaa9ddc18b00bec83e14839bcc44d11d44aa7d253f121767c6e5cf4b3df8803b2052a9a012dc03bb5b8dfff23c87d8446dbe52615fd6409e98ca2b0a5f2f947702d494567ea73802eea9259f1536c870aae6b6ce74a789c22e723e50bfa1aac086c09757738270b49e35d55f102c1be4920df11e717f1af9529e68100dd6098c8bfd6742308c19c78c4118ba00816e76616e03bea8ac4a7248364ac067a87f360acf02ad0f6b0942e1255c826ed2e49b5633dd4e966726604550601c9a2cefe295cd82b2512c34"}, {0xb0, 0x112, 0x10000, "5749c7dc94fbeef5587173cfb60047865a2edd10ed4243fbca1cddce72d512be1c849ace7e758b7946db4dda4d63769a6dc6b9c0804127e48defd566c95adade5cbf6e8b4adc3377df05542551e918636369083df4b35ab5b655367b596399dc50a92995542bf0c1247146bd25516b182ca757316525fbf436455c709135d85ac475b9ec112aa6e2f4f18cae47a2b46450abec930517d29077be49cff32b"}, {0x88, 0x0, 0x83d3, "485782a38fe30983d3ff21c6b0b7b436d1fed192d33b073b999df57d9a32c52bd561695d424d96aac78775c21c7fc2deee1707047fff4226c5104f1c93bbb9d85446d51d09760c29fa88f25488caf6d1a032a4ce4344c4f2425d8e2a77f2182597545f5f5c2aedee3daabff20094e7151013c4d1af8e5ba1"}, {0x30, 0x11, 0x1, "7d292e86fbcea0c605ba3a7e5490b3b26d2adbd980a104aede973d"}, {0x108, 0x13d, 0x737, "e8040eb4b99c044866f5dc856267fc2caa6b7c06816d4f4627dcab2ee2c49d411d1a7994cdb747c6eec050ffba6e92387148bf8c4bdfb61c4f7677b5503e2a7dc1355dcb8c4d328a8fbd03faccfda2dbb4b6ca0b137e4f18219564391f1dce03f847518dc440f5f142e0c47298ecf2bb17e4ca4900a6272abaae739c8b9fa23a47fbf3450b4f1311c13d338ab6e8016d3e6388af9ec89cd672c59779ae84f1f3cce6f339d9e30e27e88c44f3da91bc99d7cdda2dbea2358674500c09e9cf4232f29a930eb6cd631bd39a39b0f3f63cc0fc9095471d94d35c9ec7ab57523ed7738e0ef4b6d45d0bd49236c6274a0b9a9aefbca29503f85e"}, {0x88, 0x18f, 0x3, "06a8ab94172d242a9cbf49496ab8bb0ffb40f6322577e31fc85d31190979dd51193f89d3e1f55b21ba5b0b798ef867dd0a68240e80af4191279ffb820ed7121a672a3b758adbc053e8c71d2fd1e78647e4f0b19b92cdb1b75481b4f711300f2ea5f0cff942b6ea9029e042404ab56da2f9dc6c9d48"}], 0x3e0}, 0x80) 04:14:01 executing program 0: r0 = open(&(0x7f0000000140)='.\x00', 0x10000000, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="2800000000000000ffffff7f000000000400009b40f6447832ded5000000000200000000fd0c0000"], 0x28) ioctl$KVM_SET_CPUID(r0, 0x4008ae8a, &(0x7f00000000c0)={0x1, 0x0, [{0x80000009, 0x6, 0x7, 0x80, 0xffff}]}) 04:14:01 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') r1 = creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x41fc, r2, 0x0, 0x4) tkill(r2, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$PIO_FONT(r1, 0x4b61, &(0x7f0000000240)="c348d9125735e20d9879ebb3c02e4fecf3ce67b8c2925fb902fdab8e182c1c6533645dfd4d16b00287453f2172bf84ca1918828adc93ecbfb3b93495e47fb8ec4a358f5cc928a6309c202abaef0382f8a6f8c7c71cb9e7caebfd4a38e5b3e4d5a0a8b2d5228613e831b200a8e336e1fc3e99378e8ac1b9a9c203b6c02bc587f62b47f3ffb7d6ef48cb551cef93daf13d1ee1b2a9fd10e416867dd136cae48d6700c1455f9f198928a4248ddf") r3 = memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r3, 0x0) 04:14:01 executing program 4: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0404309, &(0x7f00000002c0)={0xb, 0x0}) 04:14:01 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:14:01 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) r1 = request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000640)={[{0x6ded, 0x0, 0x4, 0xff, 0x0, 0x2, 0x7, 0x10001, 0x4, 0x5, 0x7f, 0x6, 0x6}, {0x9, 0x40, 0x36, 0xfff, 0x1000, 0x4, 0xaf33, 0x8, 0x0, 0x4, 0x2, 0x6}, {0x6, 0x7, 0x1, 0x40, 0x7, 0x2, 0x7f, 0x80000000, 0x4a, 0x1, 0x0, 0x1, 0x2}], 0x2}) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r3 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) ioctl$SG_GET_COMMAND_Q(r0, 0x2270, &(0x7f00000004c0)) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r4, 0x8921, &(0x7f0000000600)) sendmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) request_key(&(0x7f00000006c0)='asymmetric\x00', &(0x7f0000000700)={'syz', 0x1}, &(0x7f0000000740)=':+cgroupem0\x00', r1) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:14:01 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)=0x80000) utime(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={0x5, 0x6}) syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0xffffffffffffffff, 0x3fe31745496bc138) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000200)='/dev/urandom\x00', 0x40, 0x0) read$eventfd(r0, &(0x7f0000000240), 0x8) 04:14:01 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:14:01 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='yeah\x00', 0x5) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") write(r0, &(0x7f0000000400)="14e45d517edc8955f9a92eced11196538cc140efd1980537ffc7f5acb38ff49f24b9bf03bca03f86d106f5f90d7cb8f57d0400e144f984bac4fd3306a9e8145cf1ce883b121644d1050cfe762c1f81994616013a11b67ff4db6341879b2547e56c7d93bd7a78dca1816f8c5a7f2c8fea8d9f145ca6ca92563956e025eb90e0d71f65e4a6d3c578d5f18df2f636a1f3e1edc49e6b8f3a3beedd4b9fe13d84ecb8ab72e6f301ba58f88ad1e4e3aaf5832a990d6ddff53ed7c43fe065d95fe513f45bfac5e0eaa0122a04b262c3744d31b986", 0xd1) [ 2913.591244] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 04:14:01 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x1b2) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000180)=0x24) open(&(0x7f00000000c0)='./file0\x00', 0x400000, 0x1) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)=0xbd, 0x4) 04:14:01 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:14:01 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r3 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r3) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r4 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r5 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) syz_mount_image$iso9660(&(0x7f0000000800)='iso9660\x00', &(0x7f0000000840)='./file0\x00', 0x6, 0x3, &(0x7f0000000b00)=[{&(0x7f00000008c0)="403dda1b148e5e8c09c9f9f0bac3e67d911e6501b8bc192cd4b358e5873fa4c86c1301c6b2454300be47792746c1a58e6c96013c1707ac43146f0d87cbec996921b277ef57d4ac", 0x47, 0x401}, {&(0x7f0000000940)="8ab2d5d9d100b3268196f68ebb83c6afcc31e5dcecc01565e12fb7bb6a76bfd9eb236753d231d9d9ec990bc67db9d340ff8ecefd9a5e3b1b91004eecf2062f53a2f9dafec8f737bd6210c989cf00a5588da52195e8e98b474a7ed27c4bf514b34fc3fa0ffa03023b2e7809fda45f5b7ac23936ffbf09ca7a50e94df4a7f86dae759d1921980ddc612326d031895b97e30abe57e7da3eb301493016a91b495e2fca9515b6ca", 0xa5, 0x7}, {&(0x7f0000000a00)="f27388254aa7599a5eae73d38dd10825e0862c27418840f7c599b3af3ebb3ea7525d278d893433332847ddf89a3998ab1451f6a721d5a9ecd57ba2885ada5ca80d030dd8f606956dce101cb2de973916cfb64ebf4ab5fa1f4ad7ac843fe0524b72fcf7eddb441b65a8f27135861bbf2c85ab685ee82e7cc2feab23d01b0677498293a9842efe4040148d73f780a8c4ead88f239227fe5ce34953a3e30393796e62534f449e705b2cad893dde29b18201921dac4a79e535ca9e76760e5ce479e9223830afda9899323bf16d5b1139c10513f3944107b10e0b1c5681c2229d642fe688659c1ae4762c26f1f6f6d53e", 0xee, 0x81}], 0x2000001, &(0x7f0000000b80)={[{@session={'session', 0x3d, 0x11}}, {@unhide='unhide'}, {@dmode={'dmode', 0x3d, 0x100000000}}, {@check_strict='check=strict'}, {@unhide='unhide'}, {@iocharset={'iocharset', 0x3d, 'cp737'}}, {@cruft='cruft'}, {@gid={'gid', 0x3d, r2}}, {@unhide='unhide'}, {@block={'block', 0x3d, 0x400}}], [{@func={'func', 0x3d, 'CREDS_CHECK'}}, {@obj_user={'obj_user', 0x3d, 'trusted-wlan0'}}, {@appraise='appraise'}, {@uid_gt={'uid>', r1}}, {@smackfsroot={'smackfsroot', 0x3d, 'selinuxem1%wlan0('}}, {@audit='audit'}]}) ioctl$SIOCGIFMTU(r5, 0x8921, &(0x7f0000000600)) connect$x25(r4, &(0x7f00000007c0)={0x9, @remote={[], 0x3}}, 0x12) fstatfs(r5, &(0x7f0000000640)=""/67) sendmsg(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f00000004c0)={0x0}, &(0x7f0000000740)=0xc) perf_event_open(&(0x7f00000006c0)={0x3, 0x70, 0x7fffffff, 0x3, 0x4, 0x40, 0x0, 0x100000001, 0x4000, 0x0, 0x9, 0x70e4, 0x7c36, 0x1, 0x5, 0x2, 0x5, 0x7, 0xfa6, 0x81, 0x8000, 0x6aef, 0x7, 0x8, 0x400, 0x1, 0x7fffffff, 0x5, 0x4, 0x2, 0x6, 0xa40c, 0xf28, 0xd7, 0x6, 0x7, 0x101, 0x7, 0x0, 0x0, 0x4, @perf_config_ext={0x7f, 0x10000}, 0x800, 0x0, 0xffffffff, 0x3, 0x7ff, 0xc07f, 0x1d4242cd}, r6, 0x10, r5, 0x1) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:14:04 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0xb8f1c2248dbb0552, 0x0) fremovexattr(r0, &(0x7f00000001c0)=@known='trusted.overlay.origin\x00') r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') r2 = creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x70, 0x88, 0x10001, {"9393c6f64396fa70a0befd55434b5d465fbfb60e57b45517d75638f0882748bf3fb26b153d75dc68c618abbc8b66ba8a4971d0a9cbacc091dd3dc10eed02878402085dc8fcfc6bf81bf9c59b22af731075ff9feba89d4b9d93158363d7fa73e6f9914ce255cad4ddd318fe8dbe"}}, {0x0, "d3d5916c8fef4763463c227e142ac7955102ca29a026a2d562d2988355d8e41c9c54305f7acb7fe1abce52d43ae8fb9aba7d6d2925f607809f3b5873a7fb165b38b09c2d416592b8e3e8c6122e8ed8ce540cd6accc9b1b6eb27a8c05ba888a44c1be0634e09b40e3e83917906f52131f51ae5e628e36919bf437f6"}}, &(0x7f0000000a00)=""/4096, 0x105, 0x1000}, 0x20) tkill(r3, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$DRM_IOCTL_AGP_INFO(r0, 0x80386433, &(0x7f0000000500)=""/222) memfd_create(0x0, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000380)={0x0, 0xf8, "702e2452ac4660569bf2cc52e7bb98eb34aa79a129be4903510e074c7f09dd37f925d897747eb463279a4665e87305da1add867e65d9c6773f1b2fade205bca44380984a386dad5f46bcade999cdb1738a1e1497d883f564bcaedc6f387ea633bc06ccda595d50c1f4c2e914b4086c1980913a39712e0b7c1ddcca648b74ce8e39ce4621f6d29f59d0d6698b176fba944b9a67e9805814a9ef42a1c3194692ba29e4254a8d0a28bfeff09780da1b5f8f748f1b71506ab7d73fdf50d025c818ec300f9f286041b058c2a055a37f4f230a9e2a9a9e5483d36b92f27cec1b4d0295d4ad45d7fa9cbd3c506ba6bf95c88dfd2db9a491fdf63444"}, &(0x7f0000000480)=0x100) setsockopt$inet_sctp_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f00000004c0)={r4, 0x3}, 0x8) write(0xffffffffffffffff, 0x0, 0x0) ptrace(0x4207, r3) 04:14:04 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$BLKBSZSET(r0, 0x40081271, &(0x7f00000011c0)=0x3) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000140)={0x0, 0x1000, "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"}, &(0x7f0000000040)=0x1008) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000000c0)={r1, 0x2}, &(0x7f0000001180)=0x8) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) 04:14:04 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x1, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x4, 0xffffffc6}}, 0x0, 0x1, 0x99, &(0x7f000000d000)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 04:14:04 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:14:04 executing program 5: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast2, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) r1 = getuid() setreuid(r0, r1) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r3 = syz_open_dev$vcsn(&(0x7f00000004c0)='/dev/vcs#\x00', 0x1, 0x10800) r4 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r4) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) syz_open_procfs(r5, &(0x7f00000007c0)='net/udp6\x00') keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r2, 0x112, 0xa, &(0x7f0000000640)=0xff, &(0x7f0000000680)=0x4) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r6 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10005, 0x5}, &(0x7f0000000440)) r7 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r7, 0x8921, &(0x7f0000000600)) sendmsg(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:14:04 executing program 3: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0x799d12a) unlink(&(0x7f0000000200)='./file0\x00') clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) getpeername$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) recvfrom(r0, &(0x7f00000003c0)=""/84, 0x54, 0x0, &(0x7f0000000440)=@pppol2tpv3in6={0x18, 0x1, {0x0, r0, 0x3, 0x2, 0x3, 0x3, {0xa, 0x4e24, 0x100000000, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x7}}}, 0x80) recvfrom(r0, &(0x7f0000000240)=""/217, 0xd9, 0x2000, &(0x7f0000000340)=@xdp={0x2c, 0x4, r2, 0x2c}, 0x80) socket$inet6_dccp(0xa, 0x6, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0xfffffffffffffffd) r3 = eventfd2(0x0, 0x80000) fsetxattr(r3, &(0x7f0000000140)=@random={'system.', 'security.selinux\x00'}, &(0x7f00000004c0)='\x88])+\x00', 0x5, 0x0) connect$can_bcm(r0, &(0x7f0000000500)={0x1d, r2}, 0x10) socket$inet6_sctp(0xa, 0x1, 0x84) tkill(r1, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r4, 0x0) [ 2916.737389] device bridge_slave_1 left promiscuous mode [ 2916.742972] bridge0: port 2(bridge_slave_1) entered disabled state [ 2916.809847] device bridge_slave_0 left promiscuous mode [ 2916.830586] bridge0: port 1(bridge_slave_0) entered disabled state 04:14:04 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f0000000600)) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) name_to_handle_at(r3, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)={0x40, 0x8, "adecfbe32b4366df04bd14fb770ec0261fce0853f4278b6017e25fc0fc5b1f557b640d3bb458abf4c9a5ac3794e047bcee6892404cd3a539"}, &(0x7f0000000680), 0x1400) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:14:04 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:14:04 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$USERIO_CMD_SET_PORT_TYPE(0xffffffffffffffff, 0x0, 0xfffffffffffffee1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r0, 0x0, 0x0) getuid() shmget$private(0x0, 0x4000, 0x0, &(0x7f0000e7f000/0x4000)=nil) openat$vicodec1(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$ION_IOC_HEAP_QUERY(0xffffffffffffffff, 0xc0184908, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffff8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000004c0)={0x1000000a, 0xfffbffffffffffff, 0x0, 0xffffffffffffffff, 0x4000}) write$cgroup_int(r0, 0x0, 0xfffffffffffffe57) 04:14:04 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) openat(r0, &(0x7f0000000180)='./file0\x00', 0x2001, 0x8) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r2, 0x0) 04:14:04 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:14:04 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x0, &(0x7f0000000600)='./file0\x00', &(0x7f0000000680)='overlay\x00', 0x0, &(0x7f00000006c0)={[{@default_permissions='default_permissions'}, {@index_on='index=on'}], [{@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'staff_u'}}]}) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = request_key(&(0x7f00000007c0)='ceph\x00', &(0x7f0000000800)={'syz', 0x2}, &(0x7f0000000840)='trustedvmnet1\x00', 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', r1) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000004c0)) r3 = socket$inet(0x10, 0x3, 0xc) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000740)={{0x4, 0x100000000, 0xffffffffffffff00, 0x0, 0x9, 0x800}, 0x9d2, 0x8, 0x101}) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r4, 0x8921, &(0x7f0000000640)) sendmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) [ 2917.777926] overlayfs: unrecognized mount option "appraise_type=imasig" or missing value 04:14:07 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) sysinfo(&(0x7f0000000000)=""/61) unlink(&(0x7f0000000200)='./file0\x00') ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, &(0x7f0000000240)=""/133) ioctl$SG_SCSI_RESET(r0, 0x2284, 0x0) creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000128, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) memfd_create(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) [ 2921.490259] device hsr_slave_1 left promiscuous mode [ 2921.534298] device hsr_slave_0 left promiscuous mode [ 2921.598417] team0 (unregistering): Port device team_slave_1 removed [ 2921.612205] team0 (unregistering): Port device team_slave_0 removed [ 2921.622973] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2921.726400] bond0 (unregistering): Released all slaves [ 2921.773332] IPVS: ftp: loaded support on port[0] = 21 [ 2921.862738] chnl_net:caif_netlink_parms(): no params data found [ 2921.902473] bridge0: port 1(bridge_slave_0) entered blocking state [ 2921.909239] bridge0: port 1(bridge_slave_0) entered disabled state [ 2921.918176] device bridge_slave_0 entered promiscuous mode [ 2921.925729] bridge0: port 2(bridge_slave_1) entered blocking state [ 2921.932132] bridge0: port 2(bridge_slave_1) entered disabled state [ 2921.939337] device bridge_slave_1 entered promiscuous mode [ 2921.960281] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2921.969720] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2921.991872] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2921.999621] team0: Port device team_slave_0 added [ 2922.005427] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2922.013175] team0: Port device team_slave_1 added [ 2922.020249] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2922.027780] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2922.086831] device hsr_slave_0 entered promiscuous mode [ 2922.127402] device hsr_slave_1 entered promiscuous mode [ 2922.169343] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2922.176507] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2922.241500] bridge0: port 2(bridge_slave_1) entered blocking state [ 2922.247955] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2922.254679] bridge0: port 1(bridge_slave_0) entered blocking state [ 2922.261080] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2922.315478] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2922.326194] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2922.337042] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2922.346021] bridge0: port 1(bridge_slave_0) entered disabled state [ 2922.353132] bridge0: port 2(bridge_slave_1) entered disabled state [ 2922.366702] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2922.373587] 8021q: adding VLAN 0 to HW filter on device team0 [ 2922.386011] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2922.394661] bridge0: port 1(bridge_slave_0) entered blocking state [ 2922.401083] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2922.420499] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2922.428762] bridge0: port 2(bridge_slave_1) entered blocking state [ 2922.435195] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2922.465075] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2922.475250] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2922.490727] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2922.504215] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2922.515605] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2922.522515] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2922.530433] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2922.537678] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2922.560564] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2922.575742] 8021q: adding VLAN 0 to HW filter on device batadv0 04:14:09 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f00000000c0)=0xc) setpriority(0x1, r1, 0x6) 04:14:09 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:14:09 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f0000000600)) sendmsg(r2, &(0x7f0000000240)={0x0, 0xff61, &(0x7f00000004c0), 0x0, 0x0, 0xfffffffffffffdc4}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) ioctl$UI_SET_SNDBIT(r3, 0x4004556a, 0x6) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:14:09 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x6d, &(0x7f0000000040), &(0x7f0000000080)=0x8) 04:14:09 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x39) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$NBD_SET_SIZE_BLOCKS(r2, 0xab07, 0x1) r3 = memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r3, 0x0) 04:14:09 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f0000000600)) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) syz_open_dev$vcsa(&(0x7f00000004c0)='/dev/vcsa#\x00', 0x7, 0x8400) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:14:09 executing program 4: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x2710, &(0x7f0000af0fe7)=""/13, &(0x7f000033bffc)=0xc08) syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x9, 0x1) syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(0xffffffffffffffff, 0x0, 0x40) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, 0x0) nanosleep(0x0, 0x0) 04:14:09 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:14:09 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x10000, 0x40) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000280)) r1 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x30000) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000340)={r1, r1}) ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0106426, &(0x7f00000000c0)={0x2, &(0x7f0000000040)=[{}, {}]}) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r1) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0xb) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f00000001c0)) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000380)={0x6c, @multicast1, 0x4e22, 0x3, 'fo\x00', 0x9, 0x7, 0x6c}, 0x2c) creat(&(0x7f0000000000)='./file0\x00', 0x0) [ 2923.006190] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 04:14:10 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) vmsplice(r1, &(0x7f0000000b00)=[{&(0x7f0000000640)="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", 0xfd}, {&(0x7f00000004c0)="67b14bbea710cf78af2d582f95935e1eeb345cae7f75172e7c46f87dbf0d37dd239ef5bf7e7fa174338c95fed9f1cd5ecb80", 0x32}, {&(0x7f0000000740)="83cd6c8462f5ce", 0x7}, {&(0x7f00000007c0)="5536d7fa467c74a91687d201fa70f66200a1f11619bff36d437667d1d2cc804d10caca337f4bb23c310d5fd52e357c7f117e328e037c0b22fbbab96bd567f8f1ec2aad2ab195757f63c5b33eec88b0fbe74310b2146b175fc5437d893f17b30f0cf443d857ab278069b839e618ef7ff9f5ff42f6df2071b523c19b1960b2fb50bdeb21261376aced782680", 0x8b}, {&(0x7f00000008c0)="5cb94812bed4b83765a6f5122176276a2e1b3ab84c074afcddf6ca83bc02316c651638da9d1fc715f6358da7ade69dc5f4c227a7dbeb814a6b309a4d8c194478ffd6411a4508e0b77612fc66f7b256eb5c39f501960452117ccd3993b40774a3243c891a2f37f1715b08b7663f6f9d3f03a69268d2e7acc566ba2ffc8494d529167cd793bacab269005a32c27fd3b311d1f42eca0f24b88bb32081c17ef26000081e028b04152e08d80be27da1e63b5d9a27df751621d2b8ab73ee48279b59ef304fa57c3a43999d6d89e349c0687ccf07c6d764faff10d794", 0xd9}, {&(0x7f00000009c0)="6b7f03d0b33f9d7f5c8d71772c97d5d583fab27861582c3ddd8ebe07dc6d35033388f36f1c25c1f238ebc873c899ae98747281338b5404113973366f058864b0a4b331d8c1c63b9a0691edb151132fb6c3a03628a85d8060d74534ea0bffd9abfb256c4646fff7a334f81ef6d1701fdaff289df337703980932aa98c1482559335495ef0a8272228ff12edfd5b22b9d328d89221f2c018c7521ffc318a17958a6d47cab440557c267c2c43d05e270874eb45c211a349e388de7972c23979095f1baf69466fefe06327bda32da3e19cc7bafbb16e37e541a081c494ada94d3f6e13a0c02c2bf9f25f24ce29", 0xeb}, {&(0x7f0000000ac0)="f8513df6d5e97a85857c7780c00e478311b64abad8733108", 0x18}], 0x7, 0x1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r3 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r4, 0x8921, &(0x7f0000000600)) sendmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:14:10 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) socket$nl_generic(0x10, 0x3, 0x10) mount$9p_rdma(&(0x7f0000000440)='127.0.0.1\x00', &(0x7f0000000480)='./file0/file0\x00', &(0x7f00000004c0)='9p\x00', 0xa00000, &(0x7f0000000500)={'trans=rdma,', {'port', 0x3d, 0x4e22}, 0x2c, {[{@timeout={'timeout', 0x3d, 0x2}}, {@rq={'rq', 0x3d, 0x1000}}, {@rq={'rq'}}], [{@appraise='appraise'}, {@appraise='appraise'}, {@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, '127.0.0.1\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@dont_appraise='dont_appraise'}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x33, 0x77, 0x65, 0x66, 0x38, 0x77, 0x77], 0x2d, [0x3a, 0x7f, 0x36, 0x38], 0x2d, [0x76, 0x74, 0x64, 0x66], 0x2d, [0x67, 0x35, 0x0, 0x75], 0x2d, [0x77, 0x66, 0x63, 0x62, 0x35, 0x34, 0x33, 0x3b]}}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@euid_gt={'euid>', r1}}]}}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000240)={{{@in=@local, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000340)=0xe8) mount$9p_rdma(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x90006, &(0x7f0000000380)={'trans=rdma,', {'port', 0x3d, 0x4e22}, 0x2c, {[{@sq={'sq', 0x3d, 0x20}}, {@common=@loose='loose'}, {@rq={'rq', 0x3d, 0xfffffffffffffeff}}], [{@subj_role={'subj_role'}}, {@measure='measure'}, {@uid_lt={'uid<', r1}}, {@dont_hash='dont_hash'}, {@fowner_lt={'fowner<', r2}}]}}) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) 04:14:10 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:14:10 executing program 4: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') r1 = creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x41fc, r2, 0x0, 0x4) tkill(r2, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$PIO_FONT(r1, 0x4b61, &(0x7f0000000240)="c348d9125735e20d9879ebb3c02e4fecf3ce67b8c2925fb902fdab8e182c1c6533645dfd4d16b00287453f2172bf84ca1918828adc93ecbfb3b93495e47fb8ec4a358f5cc928a6309c202abaef0382f8a6f8c7c71cb9e7caebfd4a38e5b3e4d5a0a8b2d5228613e831b200a8e336e1fc3e99378e8ac1b9a9c203b6c02bc587f62b47f3ffb7d6ef48cb551cef93daf13d1ee1b2a9fd10e416867dd136cae48d6700c1455f9f198928a4248ddf") r3 = memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r3, 0x0) 04:14:10 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x10048) mkdir(&(0x7f0000000000)='./file1\x00', 0x100) 04:14:10 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f00000006c0)={0xa8, 0xfffffffffffffffd, 0x4, 0x20, 0x1, 0x5}) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000640)=ANY=[@ANYBLOB="0600000000000000010000000000000080000000000000003c060000000000006bee00000000000000000000000000000000000000000000000200"/69]) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f0000000600)) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:14:10 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) memfd_create(0x0, 0x4) write(0xffffffffffffffff, 0x0, 0x0) 04:14:12 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') r1 = creat(&(0x7f0000000140)='./file1\x00', 0x0) write$FUSE_DIRENT(r1, &(0x7f0000000240)={0xd0, 0x0, 0x3, [{0x0, 0x81, 0x9, 0x40, 'threaded\x00'}, {0x4, 0x7, 0x6, 0x8000, 'system'}, {0x0, 0x0, 0x11, 0x2, 'security.selinux\x00'}, {0x4, 0x0, 0x5, 0x400, '\x88])+\x00'}, {0x6, 0x3, 0x9, 0x3, 'threaded\x00'}]}, 0xd0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x39) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x0) bind$rose(r3, &(0x7f0000000000)=@full={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x3, [@default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default]}, 0x40) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r4, 0x0) 04:14:12 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000700)='/proc/capi/capi20ncci\x00', 0x10000, 0x0) write$P9_RXATTRCREATE(r0, &(0x7f0000000740)={0x7, 0x21, 0x2}, 0x7) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000008c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000840), 0x117, 0x1}}, 0x20) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r2) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r3 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r4, 0x8921, &(0x7f0000000600)) sendmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) rt_sigtimedwait(&(0x7f00000004c0)={0x6}, &(0x7f0000000640), &(0x7f00000006c0)={0x77359400}, 0x8) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) modify_ldt$read(0x0, &(0x7f00000007c0)=""/116, 0x74) 04:14:12 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:14:12 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff) 04:14:12 executing program 4: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') r1 = creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x41fc, r2, 0x0, 0x4) tkill(r2, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$PIO_FONT(r1, 0x4b61, &(0x7f0000000240)="c348d9125735e20d9879ebb3c02e4fecf3ce67b8c2925fb902fdab8e182c1c6533645dfd4d16b00287453f2172bf84ca1918828adc93ecbfb3b93495e47fb8ec4a358f5cc928a6309c202abaef0382f8a6f8c7c71cb9e7caebfd4a38e5b3e4d5a0a8b2d5228613e831b200a8e336e1fc3e99378e8ac1b9a9c203b6c02bc587f62b47f3ffb7d6ef48cb551cef93daf13d1ee1b2a9fd10e416867dd136cae48d6700c1455f9f198928a4248ddf") r3 = memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r3, 0x0) 04:14:12 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') r1 = creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x39) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x9, 0xffffffffffff44f7, 0x7fff, 0x1, 0x0, 0x4, 0x1, 0xd, 0x6, 0x4, 0x4, 0x1, 0x2, 0x0, 0x0, 0x3, 0x3f, 0xd295, 0x96, 0x0, 0x3ff, 0x7fff, 0x2, 0x80000000, 0x1, 0x2, 0x800, 0xfffffffffffffbff, 0x5, 0x5889, 0x0, 0x2d2, 0xc1, 0x10000, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x6, 0x6}, 0x10080, 0xdc, 0x2, 0x5, 0xfffffffffffff9c0}, r2, 0x0, r1, 0x1) creat(&(0x7f00000000c0)='./file0\x00', 0x0) memfd_create(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 04:14:12 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:14:12 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mknodat(r0, &(0x7f0000000040)='./file0\x00', 0x808, 0x8000) [ 2926.057410] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 04:14:12 executing program 4: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x9, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x29, 0x0, 0x20000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f0000000600)) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) semget$private(0x0, 0x2, 0x8) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r3, 0x84, 0x20, &(0x7f00000004c0), &(0x7f0000000640)=0x4) r4 = semget$private(0x0, 0x4, 0x20) semctl$SETALL(r4, 0x0, 0x11, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:14:13 executing program 0: r0 = open(&(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x3) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000040)={0xffffffac, 0x0, 0x6, {0xfd}}, 0x18) 04:14:13 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) pselect6(0x40, &(0x7f0000000480)={0x8, 0xa37, 0x0, 0x80000000, 0x0, 0x0, 0x401, 0x3}, 0x0, &(0x7f0000000500)={0x1, 0x297, 0x6, 0x3f, 0x6, 0x6, 0x20, 0x8}, &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={0xf07}, 0x8}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000400)={0x10001, 0x5}, &(0x7f0000000440)) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x400000) connect$pppoe(r3, &(0x7f00000004c0)={0x18, 0x0, {0x4, @broadcast, 'gretap0\x00'}}, 0x1e) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f0000000600)) ioctl$VT_RELDISP(r3, 0x5605) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) open$dir(&(0x7f0000000640)='./file0\x00', 0x20400, 0x20) semctl$SETALL(0x0, 0x0, 0x11, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)='trusted.overlay.redirect\x00', &(0x7f0000000700)='./file0\x00', 0x8, 0x3) prctl$PR_GET_PDEATHSIG(0x2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x1000) 04:14:13 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 2926.502561] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 04:14:15 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') r1 = creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x39) accept4$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14, 0x800) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000240)={@ipv4={[], [], @multicast1}, @loopback, @local, 0x9, 0x8, 0x101, 0x100, 0x1, 0x20002, r3}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r4, 0x0) 04:14:15 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000140)=0x30000) ioctl$PPPIOCGDEBUG(r0, 0x80047441, &(0x7f0000000000)) setsockopt$packet_buf(r0, 0x107, 0x2, &(0x7f0000000040)="4111dc89e8a11c114089b55022a52e9fc1b206f51bae45f17827bfd3a2703c567c0523d451a566", 0x27) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) 04:14:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000280)="b1ec91cd803e8038a60ffefa2666906745d8a177000000fd53d4d41cc10fc4864c5868f4a95fc48f68ec8263be7cc421fc51c1eac4e3150d6f14fec48192558dc3c397664596d558b9b946f3400faee4749826261f696926400fe6184001fe5ff6e3dfc4411d544e4cc4e10f7d4cdce5f30f1a1254111d54111d00") 04:14:15 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) chdir(0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x8, 0x202000) mkdir(&(0x7f0000000700)='./file1\x00', 0x0) creat(&(0x7f0000000280)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000240)=0x95) sched_setscheduler(r1, 0x5, &(0x7f0000000100)) setxattr$system_posix_acl(&(0x7f0000000000)='./file1/file0\x00', &(0x7f0000000080)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c65ffffd45fe9a8759d3253"]) chdir(&(0x7f0000000380)='./file0\x00') link(&(0x7f0000000200)='./file0\x00', &(0x7f00000001c0)='./file1\x00') lsetxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file1\x00', 0x0, &(0x7f0000000500)={0x0, 0xfb, 0x15, 0x0, 0x0, "09d587884f4d817fc4ae204ca72193d1"}, 0x15, 0x0) geteuid() 04:14:15 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:14:15 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) memfd_create(0x0, 0x0) r2 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) add_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, r2) write(0xffffffffffffffff, 0x0, 0x0) 04:14:15 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:14:15 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) creat(&(0x7f0000000040)='./file0\x00', 0x41) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) 04:14:15 executing program 5: r0 = socket$inet(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x400000, 0x0) sendmmsg$alg(r1, &(0x7f00000026c0)=[{0x0, 0x0, &(0x7f00000013c0)=[{&(0x7f0000000040)="f7babaed243a71d96140f2453b9a48c4fa3690614353c08f53a8078c753ae4c0cfd2128f8eff6e05eee7dc133ac449360bbba9f520ce366a5d4660b171a5c183fd0b73c4ce71d88dbfdaa3c6620b61ce52a7d2d66b4a342f7375aec0d1412eee01f3e50989c6523d3b01937f4b62e5aca71c5cdee81a3ac4a0fceda52cfedec7120c84d1ae62c3f4b86c0e977400e7c6540b4bd98b326279f31df5201e430ec6f0443b312f1aab8c7a45a5c2a48cb17ae32861bfa36eb3b489154145e857aa86d577bffad792b6c1b686bf27cf75b619b843b5497f4e01a1d272", 0xda}, {&(0x7f00000001c0)="26cc11bc3a97206b52e72b86f96e5987bd317a6e6cc6c70cd8c58f5b2bd368db8815a8f5db6839a1ea2badb92e816a0ca898706bb6eba3c35a1a72ebd2dbb7c5a18bbf2c7505b05b20c9115e8247dd37363a559842080145eeb3ede49fc6a1e7f8260e7ddb4f3905d5e2b3506f664c16c4be02cb28f5342c48b86917bea64e2ec3dedabc864845fa32e3e08591b30363f1903d6ce2d897381fa19a5922105ed62249d22d46b6121c013b8a4f68f30de03384697bc893729985d7e2bf0c9d11907ad879da2831bedf56e89ada30d17344a49126d3d519a3de38aafbefcb9996d1f367eccbf8e6a4d2789fa7b142e136d3404ecd896833f55e6974c1d41bcb4d768006738543ff1de016083bcb0da87452b4a3b210d937f8fe8f2f5141947c5cae3e48a375886f06b94c9c7ff9387c2627499346f824cfb159c2bda06be551769d2d0c8fc3a602300fee232fbd5c341ea4682e7c4881ed31f210d1673bc0d2d974fbbd8de76ce7c80891d9d4b38d04e6ba37db0500087c42f11e00e276f9942a815f9fb6bc8515196e9e2119aa0903e2e97687d9104ce78c98bbc136888d1e293e47b2600f7e726696a725908136364b222059558dd63bd7e1526c98d0b01965b3a2b78274ee8d62e4721397bd63d2ff1cf1492a21adfe9d0913855c1088f0a3b573939219b8dea2693175e6fd824be5f9b69f0f0927d7cebf0c3d40a39ee70e34b10860d90e3ae158215e2d2ee3b2404d5d465a7ed01d8a4f438ffb59c02ec7b7607a94f64b0b6612aa1baa96e75621e860b92bccd74812746d0026953b7e647ed2cf69beb71ea7440f8474262b0d21ec5347c5d379ef817e118ff6a2bc5ba1447079ebb7e0a15883da3c5760aa195996a6752cf9ae34f3a1cd2134ff86f6df6ed0e0d1e168421d2d1cccb911f863a0d21acf0a6ca729d87488110dec85c1c9837435b34e15fd43ac62cd20b8cf6b555f789d4aa3187fb7554994092f48d71e43492fd630dd1041adc305bc0836fc2f2972a483aa6922b9ab9cdc2a5563b101c2fbcb05b069f2f9d0ecf40aedc38c539445b0ff75f24f16c20bcbcf090ee121084288cd56c03af3cffa968da896acc841b91b83296d81d36730041d39cbf542ba25d72083b08ffce038dd6a2c2a34736c49864e690fefea9ebda60a75307d2814504c8524b27b1a8b1414b268767152a5cc9f58d2f1ad7d11b9d1598ff27983a1f2c6cc09d296d098874d5b044b30ad55e8228ac5eed8a0e8b22b7decdd07c798df4aeab568b4ed403d4c1a6d7cac1e290216d8f5b11a9be0eabd389f626f00cddeaa93b16fd739c697b8ce6a20a36632b2f07d343b47f0547dc908e08aa9df501d0584b68be088492e1d4797342f92561f4e2fdfac20015fada67cb69c607d8fc8286008c0839157cdb6863458459a774ad4dc5198f58bb592237c980cedca9b47a5c07ee758e6bde79b4d0640590442619816a391971b453b92663dc1fc606af93b8f72b6d065467bc7c1800ccb12340350f8ce824e98106594edf31ccde9e6ffdba00647b2581c14a4a38dc01576deb46055adfb813a27c855b7515084a504ae2d79670cd3059f6fe6ff3c4232c6e1e74d459d265ce6132783a61c3212e80ed07c19d5d154eb4a035cc26443fef027510b16c2fd7b295a4063e156ece02bf0f86cd49014585eaa645fe364ac845b5414a47d0da0f1564b568e5a8ac5c1e8d6ab9da75dd594cbca90d52ab3f9e44085c549fe33ea7f81556a631ccd8d149e6236f0309821ca4d1e2c66b775193c33985ed395073199f71968daa20bf622c80fadfe22f24fdba2ed82b2db4c03614c43389149d9fe9fad2f52f1cb96dd5e9d4d7137c8f4b4d344df4bf89a9d39f125d20e7ce6f8956f7b0222a51d25320e8e0d00080162c07b1e84047082b17f70622e97ff5192565e7464e8e4adb16ee21db96681b616e7ef5034bd56fd4efd18c65e1f3256e6e8e03a35a48d20cb3284ececb808d0f62c233d1ef091afd150a67e31941ee528c4bbf3a8f00dd2f2e26b124173d730c93d18073e6ff2cc58c73e86f88f513ec63d9269177bbdeed5dd2f254d1be1ad4fa37089dd98b193a5bb7316d1f936639635767c7df60dc107bac07c20d0b0fe67e8d8bfbfa285d1997aab3da1790ee6e1b2bcaa38db64051ae41a0a1142f28404df6b5f8fd13745c2ae5c547b002a325d393f2f20b78b9366f6e3b26948bd48d4b986e8dc4d9988ffc66fb4bd9ca1177514b633f285c8ae37feb780eefa6f85a67c26c748b8a8d9766acd85d8e1dc5a99584b30b0a781098e9e490ca9d4587d38eb3d1b5c0036eaed0b72247e517d2548ad03348cc72493bf4a5d83bf9aaea40db64e26b5fd660e2d9744b9f03db1d65244c434a3b2de85cc9f398c7d0d35252dda1dd8074c949b92085849c6a1c9842b4a7840d09326431cdd6d42342509b84b994331d9fe7bfa3008a4110d9b617fd4ac8a83b1613fcdc5b8a381e64d120c34ea20c07fdab8720406aae7cd2be672fce31133ff2384dbbd79a69b350d4e9efb3911670f97bfc9b29e3f6e1eb5c00025f636b6b61d2cc20b8397330018a78808f20409bff6e23e8c4a366877b347f033533bdc52406a67151365d2eaadcc39384061d55f593c3dc8743150dfc19077b73f734030235ab3d09833dc32d604cea975fb39b36383cd0cf0eb8c443b1d317cd7996c6d4dccccc74ca8c096b61a71d91cf2e2808562c2cdb17030923c80a73a7d3251485b1a8b403b2552baf83e1397ce634938143590043c0268247d5ec87c8b4f82c0ebfa4509742512b04758e06c1a9badfd2691744134a3cc61667cefa12bd479d6661f472cb5f490c9156b57abf8e9a8744310101d6c36d51605333bd0f0ddc9b18dacab546f18eb5ba55bafb015eb50a2f2efdca3fb009e2b864c14dc8da329e3cc8595a6e2c38d8900630fa49680144f67b0d17d7e99682c367b3dbd7e6e8200cdb8eaf94dc7563928b2afd80b12fb7ed81103e1c150064bf994aeecf5ea9ab1c45f5721e27e4392d2469556229f021267691d622cecaedc5d096208e8a41bf03ef6eac3efa255d50283f2eb02c075b907d6cc933700655c37cd9086904fe468483499c185325e2b01c1272360447a0af13591f60dc1fe339752d86ce2fe14f1ba1dc42f4d49ac3c7cfa97b3b9a7ab82f6d5e8517b99a4642e6da18d6f4f287422ba51bf9fb863670f0b89a6f0528a773c744dde716fe4ce7becbd9c702c8c5b53c8dcaf57f8b4e24b2a6116eec8e51645283fb3adb9df8d252987fa2955bbe4c9360cb9103e34c4343f97ae20bf7d275ec6b69d4af3d028eb7f38bc2e1931758e34768a210080b63f42af28de3fed5db83fbcf0a33594821f9aaf93ea3f121e02b3cf7c885c86149a988fe8fd5cf931708d11f561519df952d26b8b8cd855203e2974a0f960ecc784e512540df26411d27d8335f95819081df2b64626de12b5236eecdff80aeb13297106d0e865af3ea586fd0df3d51220bb78786696a0759e65a4052929eaf3d53766fb4d671bb27775872ab41ada8de75aae766f4c2614f94ec39d34fa3c2f5b7e9f47bd8052d0add6e487022fcf4a9fe7b64506d9419be591c7b58804c329dd0c8f838cffb965a090e3cc19b1bf1d324113a7ec657188d0108b32b3d8c06a27e50595a195d653e1753d77415ddd9f9b4024e0c3829995e347a6f36b92dbbde694432b30a6d68e74859e52e2c1f61686ea7a139f06a8f17b0963942c088f903addcf4bc47e3be1050edf57cb7d26880c60af751c8b263fc6b70533f3b9efdb9d5c6277010ba027bcd110a7f33a628c2343c2a391c28ff231c9bc76d0fc509141bbcdcbc258225deac72650ad30ff56e5a7d75dfcba8216739dfca7e08c3668e56650ce9a0699b2dc0782073216d8c750df9a6ee4f2830cf06e5f4b1a5670b08f6a4d99792fc2e01cd01a57d5355f9867290e26d70d65ba19e270a60d358efb4b610fd9a64b544c8c1a22bdc34902f7c02fe5fb668b14ab1fbe54121a625dfc9a2cd9c6609311f37fa6f8dcae4c7d249894879305f1bd4b759cc7fd17f9c044afa6cacbd1160c11d158948564da76a938d252df9b5d3231e13c614eaadb76d961b04b910268ecbe36a4491642e6e71cb66365c9741a3a1faa3b1a996809b1eabd4cf85d95db094e9e8d6da27ee68a17c61d951fa51b3c15b6f1479ac8f3bb19cc65f3eb81d0b0ecab7186ad190691d2b1dc6a60b5016b405f9e96a3d80ab713f07d37bf5a58b4b48701aef20931292fbbb8d2dc5b735bb9f1067b220192039f4b36f1ee7cd65695df6ef29545727078cd822093c0584278048abdfa4fe02173c2d82fdf0e3dbca35f9fdf7e99e347afb6c4da767047c0f2b131204ce7ad3dd82f272b3363813d8b20a7e8092df4f0455748a3481387a80a4243442dd6ea7cd8a237db451457c16b225a24c92ce643602c65ecd1a413b1f1a2980d1d89280454b6c755dedf55c3d3c1c5087b0069f9a81b755738f673f0bdcfc2d6fcef02500f02bcf9075f4b6e1c95e8b35bf645a84d2be12dbcdf2f70ed954480d93459a370ac0949c5c57baab19b54442a5bbe0a4103477993f22ac22bf60f06b3b5a997cbb080282fdff1e3704f3ff56120ff93c474a0f3534b80987a6b8c35a1abf80dc78c1e2fd4e7fc9b188a01ae6f5d631f26e30ed982b00bc8885f9ce4c3919504b2349a4ee3ece2b52d3f2bdb6b2b4f36061b99352b9a905430405c47bf0acf4b2c160793747c09f99df933385362bf758eb7c9961025e68e2efa80f2025f9da580afa4e11d78d567c4db5d9a1a623683e301b15eb2527912db4e920031febbe28fc23b3f921df85f3e0cc556d1678c1fc5839bc3bb69f301e29216d723dd5e6693d5f43cb8cb08677063c89f84496d26e8a38950fff81c96e3b85ce5ca55b78a58f4f6adfed2eb4042452acae5b4ab03db43fee9e523f8ad8cedfca3ee06d1986cf24fd87bfbdee8f8cf3f25489a9dc54d2f154a9c4919108dac6ad85d6ad2ea50106dfd882f55cf3707d92fb3873510d3e5213dd4ef2411510ad29b7663187deb8cd6fa5b5360f874fae549fec92267b68f9efb03e4572315cbd6cfb475e262278452598f844e45db31ef4e51f134ff06e4e8e3eee8d8c3eba3755639e5655fc1c4a8b712e67c7c6d9ced153775d0167202d037a275ba4e6b4f9858e9fa83aa45bb31916cf00e1d727a2e119914466a98539cb1b0d9ddeb106f2c123d7fa4644eecafce273da67f218a7a1f0518cda3bedb783d4f3f7413aab3a8f5756ec545c9207ecf6457ba88b83edc2612b19818b6bee0c7511184dde3da5347530db8ffb9a399dcc93ae6cb6f51f678a358ff79b3e14988cfeeeb9bb8bba63c154beaadc70a281ca9e7b835a67660c6cea3131f16313d2adcb7a042647c88b2640d2ba6bcdd2ee702509ad5ada64ffcf7356d5a81320569ec85158cef830099ffa760ee1737b7cddaf5c7c87354c137efb309a7d7c777a6a5101dc9b0686690f949fefb8c2514bccbea83f14eec51e5b39d058b43cf9d2b681eaf04db0980b0a6cc7a824a0d50b324842be78e972b038439308ac5dff15d2bfd443e5dcec2ed1c69607380a0e6112db9d37be543a78074fdf4331b1782bff40dccd47aa17c7d7fa2bd4d5262bd96b525a739ee084dc258acf1a8477b7e3121dd6995d74b3e0d25ce9327daf2fd73e44a71c3e9a93124aedf2c7d8355675445bd3cc95e85291a5502be924ea71e0253d7565cff805a2a858372d350515a2714c67e9bee025c2a1b852d6b130c", 0x1000}, {&(0x7f00000011c0)="c8f8e2878e466d670f1007e9bbc7130afafd26c3aa493e02c9cdda4cd10b8064ca6e0e5c2fa949339d6cae1d2c815417f4055575dd2c1fa2c29d59b745c4ffd5fae054d18a971a182f5ad2e0ae62e9acf0fcd5fb2088c848cc1af11819c9f97fc81723fec1527e79c9343012e90854987ba840b36466df79679c570e173981e279421f704c1d13de506867586984d5fa067dbe1f5a9ae165da5db5f7c4cf95a67089397067b7b4f34fb82f50239a5f0c70741389866037bcdc563664780ceb2130fadb10055cd8226b382c7b77a3ad4dc236813216bb6fa352447b6933248e92ec3c5d53d8a52e3223a57d6ec7e56e42c8ea000fa776d0984bc83cf4cf", 0xfd}, {&(0x7f00000012c0)="cf4f36daca296fdcb39ee42af4d3304e81a5dbbddbd6997b1f0fcaaa8297904ef0c66c77ba22ed96024380bb9659da6f506526ca026cbe951e4a34b845482b3bcf2aacccd5a3fac3b6e2b38bf56fa1b7763c45d0593dfb2743d517af0e95643946c6a97b4b1d80fdb6279c241d82b57e955506a6ff5a5126dab74c68c9b6", 0x7e}, {&(0x7f0000001340)="441b94759b5592820e731e85bede91ff43f387d6dd175ddd4cf58c6c254fc07df7cbab713f4e7f6b66a08595f037b355746543f1175d816dd2033da1d7bee4375702aab489e570ed661c1656d637e8666f58aad2f2794182deb9cd6188d167", 0x5f}], 0x5, &(0x7f0000001440)=[@iv={0xb0, 0x117, 0x2, 0x96, "306d98866093ecf2189c5ec0b7ffd05624d0ef71f8df2b5e9a94ea01d8085d6acf7c8af410b77300429ce864268119d84e3d70db78d62767b87bbf448f84ee008479a89c921f12d7dd4d8aba24f2a0d477ef55949228da99adb1c6ac65a7242df14107f29a86136d5df2b96b18af2800bf80f022f6c06a326c69af58c4d417c7a40b384abed27722a05f376c8a53c5892049cb90736d"}, @assoc={0x18, 0x117, 0x4, 0x8001}, @op={0x18, 0x117, 0x3, 0x1}, @iv={0xa0, 0x117, 0x2, 0x88, "d578e91dced750b5b9f9c1943e1830dbc6b8e38494d97254147d1ff0f546b8af2da3ee55d240bc52f3eb3439881b995d7eb94f8f7000ca79732695709127b59ee4ec45f66f3a8d770b661093034c0c4574344fd7b8b12b86dfa5c7e6d1c9aae93722513682d8e4df5c755fbbfc0bca4d7e24628199882698311eb6844974891fc21b7a8b6a0b08fd"}, @iv={0x80, 0x117, 0x2, 0x69, "9427abd3c15889c45e227397c4752bdef1fbba759c56ef7ad5b47ab14177a6405ea4d6bd2306c544a06ac98ae70dfd97ce079b95d2025a0d48db759cc6bc0c1df5c53d0a43e669a6d1ec2d41f046e3d897dc731ed54cea939b80ee0f8b15a0aab142c31a03f5416a08"}, @op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0xaa}, @iv={0x20, 0x117, 0x2, 0xa, "c60a0e37e6136eb5a20e"}, @iv={0x1018, 0x117, 0x2, 0x1000, "c7411ac115599e01fc818f9dbb57f4fbe467bb28843c0a15b7256dba1b18381ccf5f3c38538f180666ce3e08b4373e4235819c3c050e0556d1207381e7966bdf0106aea32840ce7fa90c80026626855a8064faf22d69b8f41e0eb682de43af169f76a347a1f600cfaf8bcdb5ae3b68716bd214159a35eefd8bdb23361406b7468d5c63f23970a1630aa83fe94e051412efd7af5ffc4789e2ef6e481e57337d992f6ab8784c3dd5b8cd06513c71cb3c5d1db7f3b85c3cc88a41e7de54bc9ff70c8db22eb8a8dcc57774cf1977ed7150311afb596ae96ed49268725fbb26d54c4e97ac73524c1640339f1004a02e2aea60ac2307184755fa4b4a968419eda275b61f7526a373bbd4e44bbb93e29450e6a0d34d54881f07130a1aabaa8f5c3c4816f1a4d1ee94eeeb62da8b3c345f265182dba2d65ed8b2c68590ba93c728fe03ceb6a2b13b2385fbaa08076fbd0fd629f4b47af0cb72ff908438a2cd15407f57612139477e8606db0c099c2da77725fb5e434264f91ae1b353c29bbf073dc9d4c5f02522a3859aff6871b17193c73bbc562b79a25a6273fd196e71b8d3ec9a115a8723268618ae730fc294362ef021de67d051bbeefb2421b51543660d397c9589db42197551e46261bb609d629e302916cea92cb922b3e4c302d338ad9e9845118aa4bfb88d5c059807935151b6e14be9a587274907c7c881aa4550624405e70e677267a78210e0e158482e5320883747b979836e7ee8579ba058d988a8d15a2a863df425744c490450fd84426bcf5b1e62dc386c6e83fd76787a35ed77234054771c0ddece69d86a69d53045e64b8b4f1ac069bb495b6b0f19bdaa7e9cbd10f035cf3c052511018c05c83f896d347a3bc8dc61ccbb901c9231765748bfaf42cbbd807bb78832e81a2100a4743f7b0b0a468c6127b18bf0d088e5325929331bbd5cd91cca9a31f2a625ef731ffa72f591be811554efd0a2921d781715729f387edd73995ce5fbf3d140e2f81448a1ed015cef58b3aa40e2ee3dde96b2695577b673319c652ac416ef6b41bc87b2b3ab34e83903bb00163ff4074fb1a985347a7a535d007386dd7f9688fc82c12d806205c55b2bc3e44b9b22c9369cebf31794c5f9e7312b4a4460cc6bb9cfc6faf8037525e0a7dd9349deb176b0b8ab17b71df3cad52f8483afb69c867d1a63176184ed777f355534c8b42301eeee1de85c01aac44063dc771e3fb7caada03fce825de43e89575b0d381b1b38af579bc5b54b6be09acbf6baa6f3f61d6dabb76f10321d6e94df546a4eb879d4b4c8cd72424ac1adf8c785acac36f8d8f7a242305227cf384da58fca2bb52b49f204b49e51d316cb06009c5bcadcac2e4b208e3a6dfd7cc1426db33e994fb66c00ea36de1d67de267e92de4eaaa8539fae725eee25aba32f168cfed927dd85612315a921c40d32580fbf1b6a732501893e7ea1ca649c4acb0e4cfb98a89294d9ef0abb3ec30a3d48dfd17ca847ad568366993b1c1c2e636e26a154df2f0762a0a3666e5f3f098d19e599343a98e2e645c7026f8c62a1c37af11f364c4c3160e2d7e05f68ff6feb60df27b86615aa0d6b30420ea620a3ba2347aee2c5cebadf0fa336481029ace42132afcca8573c6c18bcf1c36a21d3ad4818073979b81d6c71525b22daaf65aa3a7b72adbe43b9224e04faaf18fd92648216b311e018bb50b683763eff40435d9f7453caa0ccb8baf3887b71e9188d9cf32cd2bb2c785c0d238694df3e7c39bbfc3dfaf5e627b370b7107429b2e928ae6a88a6436a3e7b3039d1089b9209e2087c4ce0262fccce0374d5420f1b1756ccb46d64aeeb0c05437aa053f04103e27abe656b32f78b79d377d204525d2cc4672ca0937bbc8b35ea351919029094d2a2950a8ccb19f61e72a45d2a19210a74f2c61da1994b798dea35f77187a406dcf4207a65a513cce2b95c64990ee0ca0535478ba30c0301377444081b35253be59da25573f926259b2598de693141139fd2c5c90f42168608b31dd167097b88149e83779d8ae92f55a4e98cb673845e9ddd296fd1a7767266ba103c22e30b1aa757a4e5f32a2f1fcf86fd57c244c15d2481e6f7d06003bbe7f06a4b24412734846d37be238d621f6f7a7bce3d03f0719aa74fdb9165439ea087257fdde66bfcabd5a6320e52f0a0375328db1338eebad91b5621dcab52e4f718f57989e061ef2d21d2b50abf79c8b9348e9a2e8e5e3e7fa3bc2b18aacb4642e6d36108e270c50aebe6be7ee12665dfd599a87807273c3702b8210965f3f67c7f96b9064cdd2f3dcc0286390b0d707a1628b4993beb4050a8036d76fd4da660bba96720d7d1eb074d1418074b53b058badbdd433851549e53c343aa53282e883bc8ff4cc8714ba1b9b75efe49dbf96d4d7b1f41f36b1c4b8f90a2aee9d71a90377ccaeb1e73f34afdbc512737bc2180d2eb534bc903aed4cb9f53c8b9f9e9ffde29339fd26e6e4246b395c479b7402800ad5c0e8e62fbe2cc863ef89c45808ce0ccd7f117b3561bd423c2894fa8fdc1ee8c202ef5e3fd612dec5a43ee6babf0eed69f1a137931177890a9ec7c770a9feba071ea73f9ee8b214da5703637d5d5dcbb237a6d0b97fa7ce0b720fed17eb7f9f6478abbcc987375738c02e820a19618a6a1430b100a45b34f99483832c1f9f054d9c8216333fcf13a6634241813b3f5b77ba4da3fceba0e0d6e9f6e89c679d88eadb97d04965234eea794c4d7899b8ed4f4e0d4cc24f6345e500ec34947a02c98f3186ed3e53d67d658f849c369e3a245eca7e5fa48106c0af548c2b6b9d4ed9b15d8cbe9782991885f5d2b38f495c4da07887105e84c7720124cefde940e97bd9365e0e60d400710c3d8da00c0f345d1156589177799654424c8e1cc9a24756c834a757650334544f46a00c20eb8d22baf03390f8a540613e084730e3b31ee4598e3db719eb2fe6f600af0385ffb0a37c4b211a87d5cc2e07032d356a64f51aaf9266bdea53f4957721c649d7106dd78d42ef6b8776e19a781dff28957f5bff3bad932c6ea269bd52b449a1d29d9ef69deba29109154cfa74426adecd1484290e5090218be71773925196bb5cbad4d3a97902a420e8139f26c89ba2ab65e34364dfb08110327ae5567b601b9c5c736e59f40f69e10b240ee0f6305ba3d800c56de2892254af013d980f2956816757d54bbeda9b6f1c63daa90abb1dc90ae70a21e3fdac5a43c10baca65741d67d0d796095cd62b87c6f7650e0db4d46d0e6e651309d1a562062a08f20e9ffc5cd1a13f57a1bd69c04eef966b2c262242e0a325767906e8e455f359dc997e5c0d195b22e56b5149b3e4669334dac230605fa8664553150c8a4ae200d80d7853e2871c289c11d9c1fa79630ce1c2c4615e6093fea7ca11f319a55b73eb704b9d7a46cc5e0ece5363dd62b644c2a8bba4bc157a605451b3189cb3a274177b5e83c2ad03650b531499123a522f5a24ebe96dc4a494c4525cc2b683f5c6f455a95cc0ce05d579580c1356b777479da0e8c3b3b61b0faec1a42a9a02eda723347b186e333788fbb86760e059fd8279ef7b5ce2ef032b0e39f2400925b4e53e55823a771e836582f30cfebbd89b60c88dafbbbd9369cbaf782fbb69ef9d4f5d58d01eb80f535b0cf80319b6cf111f50b5c459d0496db617238a369252d74ff497641bb807bbaaade87eef345c7606a5cb78136ba5d7ef87c6525f8abaf5296c0fda8223a631bdcccf6b8da6f08f07c9bad9137858f39f7312872af53fbe5776e284d319318c4301e0da9c4820b93bf85e7f86cf688b6542e940f116dbd2174eb2e01aa0c64c3f1365fa31745f9313a7ebd205d31458fc8c7631bad95c92c54bbec25df04a3d78c2bb0bd431cf2b77a6e6df015180c2c0afac1ff639f18da38b38bd129da220facad7d1367f69a932cdd0214c60b0c31d92fdd125d25792239ce4a447092f299abb387b00c14317216ff97f3899ab54d0608b040f266a2d0316ca477582f479080ba516406eaaddacb363120e9ec46631839e1d4d09caa89212e61edbce4e9d28a4c1da7bfcd0fc67faa573f5c928a9daea87ad222b4416406c1ae8dfe3433be04b5df1da258120033620e34791920b44c79d75ce93d0f9821569b635e519984b41317b4878e5d62a849d04c7b4bc5602bc08c8bff23b7995d477ba8ca02b8b71d19433f3d67c6f06f111e2407a482d92932872857c575f6c21203eb48cf03cf40e66382b343c697487101f21bd8448e443d4ae257a8d4316e7f1845a481eded08e020ffc58f0364f4b47dd7a271703744c7def6ee921dec1ad2c54e4f96416cf70a797e4602586ec4887ce110cadc4eeed18fb3284b6090c77195640079e81ce296c9e5ac79db1cba3fe8dfa2c9e0427c9afd0b0435b5100e12e7b8041d54c62eaeafffda6074d22818e4300cad279ab619601e4a0b1b53bbd7ddfeb134d8e2ccdf68669fac6a4dfce1cd6a6724c0eeb597b195bc9c2d17d5b073e9c57e5ed173ccab72b9da5ef4a37d9c2877f52d0b06fcc670e9a4f34cac1e8b8bccf6f6704eb3bf7fd1b68421f604d8a2632771a123723f3bdaecba6db16cb9406e7ab06fa61feb518750b5e2926fa33b70d8090b00695902e6bf294df560be4395249c84ac51e70f74533c83c74677854c3d48320bacff326d82b0885012b627d41745716da46ae64cd7c3586ad7f3128f85261a346a2617040f3ead2ab0ae4be5b4a2686a9f8ec2c02b02eb0f2561ba7c0c95f307a4863d84c54413d0461102a9d4c99cefe9be64f19ed8d1fd1037bdc3005f2df5fbb10d255392be90625d54d2ff46c34e4dd97c327b8d225353cb67997681deeb7d206add328cabba91591599aec5419916fbc8706a76f84e06d15dd60be1771b65a18c1f64637023155b491d51c7a7572494863df97b72f7035dd82e5784a518b985d234132a9ae39482c6d696d58667029fd183fcecfddfcf9132599f2f0cd98d6cc49e96f8d7393dd3018d0a6cbd1e182dd0913421c187d5ad398f6a84c84538edd6333bec99db32ff418804e4554b5eec3caa24832f996e46cdcc56e06eb3f4ccb2abb2de856a6eb34be1835466f097fcd95aca96772e3ca2ba243a42e6a5b581d66ba45c615a177b063c69e9aee328a45bcc982a38c85e1db3842a0c0e54cee09cf70f8af3b4b26e7754147d56386f79f70f7dc267370d436e1fbf3e25a4ddf0f1c7a31c4493e8b7cbd181837475b562dcd4b84f46dba3710bdf89f131ec9611fffe357a851b25cee57b2ad20015bb658bec84368b89074557f634ec8dc0c742ee91495d274ac5021f1cf73a51847120258eae61277ca10ef9fba7759b1e28985c7db104c2be43b956a0a870a2c984f026aeed9b9c44d5564af6aa1563a9d48917858480dde003617a2085dac37c04b8bf9cb75de29ea3e56268f9b607c77a8ac7195492448c52aea5388cc6967e9f56541361a560f51d9a3423ea8e54d059aad39884189bd7dc7047dec0beff488cc50639a82823b7c19cc733749bf55bd26b01ee7d108a5b8e75e1cac9ab79b2cfb52d74ca67e5cbb7d4ee0c7a2eb1b05e768e064e2aed17d5593922b217a8c53390c11cca8e2b7a059333c877749b190be2f79228cc2f8cfcb62ae0a916e12b9afb039ed71777a542d391f5da58c80bd6c88adf8f32d6edd65c18573d083acbaa33756a1e7ba07b062c9b859ed625dea4ec0d580b4a2bb8d5c6a898b0f91ea209e118b6f4b952d99fa18f62921f8c087b010f8b025dbea1a01e73acce516c984e6ac700f1077"}], 0x1268, 0x800}], 0x1, 0x400c0) sendmsg(r0, &(0x7f0000004a40)={&(0x7f0000002700)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'wp512-generic\x00'}, 0x80, &(0x7f0000003780)=[{&(0x7f0000002780)="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", 0x1000}], 0x1, &(0x7f00000037c0)=[{0xd8, 0x116, 0x7fff, "547a86c58a25b652b5e151c35f8d604fc7226902704442b43c58a7718896287455ea8d9f795f920105f91cca6c3a3c2128b50eef1c56c97d33cf9f122952a8bc66d028e42ba857aa548f98ecb07068ccc44e5c18e18caaf1620784f979df4bc04e514cc8d2977f9e9a542efc9912796ed2d4f0b97b64dfe8db2776913aad791d4750ddbcc773f0d28936ebd7eec3451040edadd0d3c180ef017aa5de05c74f38f86547314edcc191db25a15ebc741ea76c4203ccfcd65bb296d5a14d230f9b0f7897674ef8"}, {0x80, 0x103, 0x7f, "451711889b464a37ba7c53093bf7ebf997563fc68c2a0112c42801306b07b87ed470ae3ad70d1fb64282912a8a301b1fb5fd4250b27382a12476336d092391ee646f6e2f568391dd140ac31eba04034e2333f5e5fec53670dddf848cdc0bd8390c3c225ac55ba56804e8892b5c"}, {0x1010, 0x19b, 0x3f, "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"}, {0x100, 0x189, 0x2, "b0f11812632fcec8aabc8113e34ce3a29358a50450fd2b5636362e3ce60afb85e3355213b69478892879cbb51ac165ad4d6d8fc7dd47da52f9bfd5125d58e7dab83ae53226379d3c47cd2fd02e0757bb7f71910cf7784d8387459b0afdf032c2cafaca99ad5e410656d2d3dbad84772aff88e4833020f923b6207cfdaaf17efdcbdc041cc6a1d9cf1993e1bfcfaddd0bc0ba43f4c0ded8754e594a3a886b9d9c5bb5b21a0a1f93ecfd225af9660b92bee788abc755dc6173707d20d87da279a55eab2eef704742c2aa6edf8eaf556e78df0a80c8197bd7a4e0ee266819d5fc10c178e66255ae3e1c74d844487288427b"}], 0x1268}, 0x20040000) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2400000010001f001cfffd946fa2830020200a000900010006e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) 04:14:16 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$KVM_GET_MP_STATE(r0, 0x8004ae98, &(0x7f0000000040)) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) [ 2929.543146] netlink: 'syz-executor.5': attribute type 1 has an invalid length. 04:14:16 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 2929.603461] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 04:14:16 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000000c0)) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) 04:14:18 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0x9) unlink(&(0x7f0000000240)='./file1\x00') r1 = creat(&(0x7f00000001c0)='./file2\x00', 0x4) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lsetxattr$security_selinux(&(0x7f00000002c0)='./file2\x00', &(0x7f0000000300)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:hald_sonypic_exec_t:s0\x00', 0x29, 0x3) r2 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) lsetxattr$security_smack_transmute(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000280)='TRUE', 0x4, 0x3) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3a) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x1) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x0) r4 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_SIOCBRADDBR(r4, 0x89a0, &(0x7f0000000380)='irlan0\x00') mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r3, 0x0) 04:14:18 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) mount(&(0x7f0000000100)=@filename='./file0/file0\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x201000, 0x0) readlink(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)=""/4096, 0x1000) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x0, 0x0) 04:14:18 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:14:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000200)='/proc/capi/capi20ncci\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) ioctl(r0, 0x8001000008912, &(0x7f0000000000)="60dc1f123c123f339bd070") ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000002c0)=0x0) perf_event_open(&(0x7f0000000240)={0x7, 0x70, 0x7ff, 0x8, 0x8, 0xfffffffffffffffa, 0x0, 0x3, 0x1000, 0x4, 0x2, 0x30f5, 0x10001, 0x9, 0x6, 0x0, 0x400, 0x4, 0x380000, 0x363, 0x3, 0x81, 0x0, 0x5, 0x100, 0x9, 0x7, 0x2fa, 0xfffffffffffffffd, 0x23, 0x2, 0x3, 0xfffffffffffffffa, 0x7, 0x4, 0xffffffff, 0x1, 0xfffffffffffffffe, 0x0, 0x2000000000, 0x1, @perf_bp={&(0x7f0000000040), 0x2}, 0x200, 0x9f, 0x0, 0x7, 0x10001, 0xff, 0x30}, r2, 0xffffffffffffffff, 0xffffffffffffff9c, 0x1) madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000100)={0x0, 0xfffffffffffffffa}, &(0x7f0000000140)=0x8) socket$inet_udp(0x2, 0x2, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/mls\x00', 0x0, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r1, 0x4068aea3, &(0x7f0000000080)={0x7b, 0x0, [0x80000001, 0x401, 0x3, 0x4]}) 04:14:18 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x7) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) 04:14:18 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') r1 = creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) memfd_create(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_GET_SREGS(r1, 0x8138ae83, &(0x7f0000000240)) 04:14:19 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x4000) getsockname$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14) 04:14:19 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000080)=[{0x4000006}]}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_GET_VERSION(r1, 0x8004552d, &(0x7f0000000080)) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x40000, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000100)=[@mss={0x2, 0x2}, @mss={0x2, 0xed5}, @sack_perm, @window={0x3, 0x6, 0x6}], 0x4) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x43732e5398416f1a}) 04:14:19 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:14:19 executing program 5: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000100)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x12) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x1000) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x800, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r2, 0x28, 0x0, &(0x7f0000000040), 0x8) 04:14:19 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') r1 = creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ioctl$KVM_GET_PIT2(r1, 0x8070ae9f, &(0x7f0000000180)) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r3, 0x0) remap_file_pages(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x3, 0x100000) 04:14:19 executing program 0: openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/validatetrans\x00', 0x1, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x1) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x20030000) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) 04:14:19 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:14:19 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) recvfrom$unix(r0, &(0x7f0000000140)=""/209, 0xd1, 0x40, &(0x7f0000000240)=@file={0x1, './file0\x00'}, 0x6e) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) 04:14:19 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') r1 = creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000280)={0x0, 0xb3, "381c755f6e92886ca1e262c4706be2ee4ed234d0e2c3b1fabd97cb30fa40149ce8a9e983da7824ce64c437e1814289ce7413c1755c1f27131170db9a8805bbb8e9b27fdf188f627c1ca792e50e0c45629d6bc7e0261119102583cb6cc555e8cf6503c7704c0223b5c3ff536d50708fa2db67ae30cbc162da8dcf924f1fd6eb939681da66ea838a735d3387528d60e18d523166c30f5f02794273ef53be941b04d9f16341ef68c571dac5fd4bb674251f780443"}, &(0x7f0000000340)=0xbb) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000000)={r3, 0x20000001}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f00000001c0)={r4, 0x4, 0x30, 0xca3, 0x9f}, &(0x7f0000000240)=0x23c) tkill(r2, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r5 = memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r5, 0x0) 04:14:19 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='\x1f\x00', 0x2761, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) 04:14:19 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:14:21 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x27) creat(&(0x7f0000000000)='./file2\x00', 0x5) memfd_create(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 04:14:21 executing program 0: open(&(0x7f0000000100)='.\x00', 0x0, 0x0) r0 = openat$selinux_create(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/create\x00', 0x2, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) 04:14:21 executing program 4: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x3, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/relabel\x00', 0x2, 0x0) perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14363, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) write$cgroup_type(r0, &(0x7f0000000280)='threaded\x00', 0x9) r1 = perf_event_open(&(0x7f000001d000)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) accept4$packet(r0, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000300)=0x14, 0x800) bind$can_raw(r0, &(0x7f0000000340)={0x1d, r3}, 0x10) keyctl$read(0xb, 0x0, &(0x7f00000001c0)=""/59, 0x3b) getsockopt$IP_VS_SO_GET_INFO(r2, 0x0, 0x481, &(0x7f0000000080), &(0x7f00000000c0)=0xc) write$cgroup_type(r2, &(0x7f0000000200)='threadedP', 0x1cb13) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) 04:14:21 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:14:21 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128l-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000000)='dummy0\x00') 04:14:22 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:14:22 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) prctl$PR_SVE_SET_VL(0x32, 0x3e726) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x9, 0x1, &(0x7f0000000440)=[{&(0x7f0000000340)="54dc80e7f783b5ffe4edb472e404590671b638f3e725b3d8416d510700ef938ba6b55b097026feb7717ba1d00566f4fa254d996d79dea65fb813d8bf448a834c39fd6db7a24a0cff3b329fdd518c76c33589fb5b7cc254a5ab9af2e2776dadcb632868ccd9bcb5b127edc89e4cde62a1a67dd327df36022701e9eb83b7f85210434f383af440dfc6e683ef341d804cd7f05ab78ff11338ba513a566f4f37681837b14a7b2d247366d36213008f89f542b4e923bad2e8ce4b047e765800a81d7d8a7b9738c41e35ca7f377fa1b40d6d90839b", 0xd2, 0x7fffffff}], 0x10000, &(0x7f0000000500)={[{@mode={'mode', 0x3d, 0x2}}, {@check_relaxed='check=relaxed'}, {@map_normal='map=normal'}], [{@audit='audit'}, {@func={'func', 0x3d, 'FIRMWARE_CHECK'}}, {@uid_lt={'uid<', r1}}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x0, 0x34, 0x36, 0x77, 0x7f, 0x35, 0x63], 0x2d, [0x63, 0x39, 0x64, 0x63], 0x2d, [0x77, 0x61, 0x37, 0x63], 0x2d, [0x62, 0x64, 0x0, 0x66], 0x2d, [0x39, 0x33, 0x0, 0x33, 0x65, 0x7f, 0x66, 0x61]}}}]}) fchmodat(r0, &(0x7f0000000080)='./file0\x00', 0x1) mkdir(&(0x7f0000000180)='./file0\x00', 0x80) getxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)=@known='trusted.overlay.opaque\x00', &(0x7f0000000200)=""/135, 0x87) 04:14:22 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x81, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) fsetxattr$system_posix_acl(r1, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000680)=ANY=[@ANYBLOB="0200000001000000c931c372c7d1e312c8de6ccf0000345d2fbed70dfee27ee74b1fac1a00000409000000000500001000000000000020000000000000008b83c9e10d195cf3305363fd3ad5ed33e4b3d0b3199f518bfab447dfc9f940fc33409734fae607d082d1eaf4a2e5a2416b6003757a5b2afec5388ce64b984715d3f88623473d21651a27749c033ea08ac61fffce90b1782c"], 0x24, 0x0) readv(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)=""/43, 0x2b}, {&(0x7f0000000080)=""/34, 0x22}, {&(0x7f0000000100)=""/146, 0x92}, {&(0x7f00000001c0)=""/234, 0xea}, {&(0x7f00000002c0)=""/29, 0x1d}, {&(0x7f0000000300)=""/219, 0xdb}, {&(0x7f0000000400)=""/158, 0x9e}, {&(0x7f00000004c0)=""/129, 0x81}, {&(0x7f0000000580)=""/55, 0x37}], 0x9) 04:14:22 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) 04:14:22 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:14:22 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x1) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r2, 0x0) 04:14:22 executing program 4: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x143080) r1 = getpgrp(0x0) r2 = getuid() fstat(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffff9c, 0xae01, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000006c0)=0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480)={0x0}, &(0x7f00000004c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@ipv4={[], [], @empty}, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000600)=0xe8) r10 = getgid() r11 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000640)='/selinux/enforce\x00', 0x40000, 0x0) r12 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) r13 = syz_open_dev$radio(&(0x7f0000000680)='/dev/radio#\x00', 0x0, 0x2) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000001540)={0x3, r12, 0xfffffffffffffffe}) r15 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r16 = syz_open_dev$video(&(0x7f0000000740)='/dev/video#\x00', 0x800, 0x30000) r17 = syz_open_dev$sndtimer(&(0x7f0000000780)='/dev/snd/timer\x00', 0x0, 0x800) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000007c0)={0x0}, &(0x7f0000000800)=0xc) lstat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffff9c, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r21 = getpgrp(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@dev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000a80)=0xe8) lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r24 = gettid() r25 = getuid() r26 = getgid() r27 = gettid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001080)={{{@in=@multicast1, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000001180)=0xe8) stat(&(0x7f00000011c0)='./file0\x00', &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001280)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000012c0)={{{@in=@broadcast, @in6=@ipv4={[], [], @multicast2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f00000013c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001400)={0x0, 0x0, 0x0}, &(0x7f0000001440)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001480)=0x0) r34 = getuid() fstat(0xffffffffffffffff, &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r36 = socket$inet6_dccp(0xa, 0x6, 0x0) fcntl$getownex(r36, 0x10, &(0x7f0000001c00)={0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001580)={{{@in=@loopback, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@empty}}, &(0x7f0000001680)=0xe8) getresgid(&(0x7f00000016c0), &(0x7f0000001700)=0x0, &(0x7f0000001740)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001780)=0x0) r41 = geteuid() getgroups(0x1, &(0x7f00000017c0)=[0x0]) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001800)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000001840)={{{@in6=@local, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000001940)=0xe8) getgroups(0x1, &(0x7f0000001980)=[0xee00]) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000019c0)=0x0) r47 = geteuid() r48 = getgid() sendmmsg$unix(r0, &(0x7f0000001b40)=[{&(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000240)=[{&(0x7f0000000100)="6d3466a93c1b825a744552ad9cc0abd62cdbc04959cf128bb658ccd3c8a713", 0x1f}, {&(0x7f0000000140)="cb485264fc89e8df96dd0c25041d34708ae7b32dc11f860ef5b55da21d6831133fca01a789078d88a703f51638a367f93c564ab5069ea79059c48584c9b16048f69947d3ef9838a18876ecaae101e21b3c52df9f53a9605df1245fb38c8b65ec780387b7ccc1af3f245dfe436c111599f49e", 0x72}], 0x2, &(0x7f0000000b80)=ANY=[@ANYBLOB="20000000000000000100000002000000", @ANYRES32=r1, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="0000000018000000000020000100000001000000", @ANYRES32=r4, @ANYBLOB="00000000200000c2", @ANYRES32=r5, @ANYRES32=r6, @ANYRES32=r7, @ANYBLOB="0000000020000000000000000100000002000000", @ANYRES32=r8, @ANYRES32=r9, @ANYRES32=r10, @ANYBLOB="0000000030000000000000000100000001000000", @ANYRES32=r11, @ANYRES32=r12, @ANYRES32=r13, @ANYRES32=r14, @ANYRES32=r15, @ANYRES32=r16, @ANYRES32=r17, @ANYBLOB="0000000020000000000000000100000002000000", @ANYRES32=r18, @ANYRES32=r19, @ANYRES32=r20, @ANYBLOB="0000000020000000000000000100000002000000", @ANYRES32=r21, @ANYRES32=r22, @ANYRES32=r23, @ANYBLOB='\x00\x00\x00\x00'], 0xe8, 0x4000000}, {&(0x7f0000000c80)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001000)=[{&(0x7f0000000d00)="d9ee8ceebbcff41995a8a7365dd0551795a71b431720485564db4337422a3a8760f81318fb7e27bc09db3336216cb9ce98", 0x31}, {&(0x7f0000000d40)="604f5216e214a05fe05d6f732658f116601489fda4160c0c8c23274cd22e951176d072c7c162a44fd9953c5cdeb61a635c71f831dd", 0x35}, {&(0x7f0000000d80)="53f4b83dfa7b25a2dada360733834aa318f735ca2a97797ef94ddd0183f3c9ab895d9d7af702db7394ecb64e7ced67ae948ffb0f0b4c4db61ad0d96b0602cbca473640d031b9f2a3aa7f80ee46d827584eccf7c52e0e2b5686a206eeec03c15aaa977838f165237fd8b2a8043f17b904985ef9b1131ea67ed4249c8163414a08c18fddb02c5d4eafd059389164bd76f73082ee607349f30258632842855afff0d2702661c8b6fab2f2d90365a47c5cd4f87d57630c4a05bd6080", 0xba}, {&(0x7f0000000e40)="2edceac04ab8c22f63ee2a519ee520f95f25e93dbf144a285c5016ff12af9b0c7c5c744f789610fc9d449cf862f7a439f7f5ac603684853ef78d499d01355f3fc4e95b1b9a447b813cb55dd06e8691257cd68a36a0501b817b98d7750ba47556bdbbf6206f42e1782409a206f0dd5d87a36461177a4d4d17297408a3d044641accc799731d28e90081b5b64552428aec83ddeb15ea", 0x95}, {&(0x7f0000000f00)="686ba48384936fe3a2c2cdba18561dd21b5e183287e33eb1396cc33dbe3f79adb932dc61820f6011c60d811f9bd829875fecc3f04d4155359a0b0bb9b273429e8939755e25b34e38a476ce937aad598884c90990a3f12fcab84539cfa2808f84c9c54943c4f692a9b3de35a5754cd785da040aecad7ce969836d11532b2468741e8871360643593e217d1c2145668a7582a025bacfccc148985243b2d1aa6fff888bff6bec7c8c4de12d537cb54d192d593aa569e5579a3a83fb2c865522a4749554b0dcf72b906d59b2f8f7f06ee8e713b1f826", 0xd4}], 0x5, &(0x7f0000001a00)=[@cred={0x20, 0x1, 0x2, r24, r25, r26}, @cred={0x20, 0x1, 0x2, r27, r28, r29}, @cred={0x20, 0x1, 0x2, r30, r31, r32}, @cred={0x20, 0x1, 0x2, r33, r34, r35}, @rights={0x18, 0x1, 0x1, [r36]}, @cred={0x20, 0x1, 0x2, r37, r38, r39}, @cred={0x20, 0x1, 0x2, r40, r41, r42}, @cred={0x20, 0x1, 0x2, r43, r44, r45}, @cred={0x20, 0x1, 0x2, r46, r47, r48}], 0x118, 0x20000000}], 0x2, 0x50) r49 = socket$netlink(0x10, 0x3, 0xa) writev(r49, &(0x7f00000000c0)=[{&(0x7f00000001c0)="580000001400192340830180040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010005081000414998cf15c3fcff", 0x58}], 0x1) 04:14:25 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000200)='./file0\x00') r1 = creat(&(0x7f0000000140)='./file1\x00', 0x0) clone(0x8000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x39) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000280)=0x5, 0x4) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x810, r1, 0x0) memfd_create(0x0, 0x0) chroot(&(0x7f0000000240)='./file0\x00') ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0106426, &(0x7f0000000180)={0x2, &(0x7f0000000000)=[{0x0}, {}]}) ioctl$DRM_IOCTL_LOCK(r1, 0x4008642a, &(0x7f00000001c0)={r3, 0x20}) bind$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @multicast2}, 0x10) write(0xffffffffffffffff, 0x0, 0x0) 04:14:25 executing program 0: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$SIOCRSACCEPT(r0, 0x89e3) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30000) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) 04:14:25 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video2\x00', 0x2, 0x0) syz_mount_image$ntfs(&(0x7f0000000140)='ntfs\x00', &(0x7f0000000180)='./file1\x00', 0x8001, 0x1, &(0x7f0000000740)=[{&(0x7f0000000600)="7dac3532239c679fa44c86b021e422e8af21388c68cbf3ca0b919fca815d09dc4d7eaf1a1c17ff513844be0ea2affed9cf010b06507c9b0f1cd822ad973e4d7668cdea1721da814173", 0x49, 0x8}], 0x8000, 0x0) r0 = creat(&(0x7f0000000000)='./file1\x00', 0x4) ioctl$VIDIOC_S_HW_FREQ_SEEK(r0, 0x40305652, &(0x7f0000000040)={0x10001, 0x2, 0x7f, 0xb23, 0x7, 0x3b, 0x1}) 04:14:25 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:14:25 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x0, 0x2) ioctl$IMGETDEVINFO(r1, 0x80044944, &(0x7f0000000100)) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x50307d, 0x0) ioctl$TIOCSPTLCK(r2, 0x40045431, &(0x7f0000000080)) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000180)=0x3) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x9032, 0xffffffffffffffff, 0x0) ioctl$RTC_AIE_ON(r1, 0x7001) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000280)={'filter\x00', 0x7, 0x4, 0x4a0, 0x0, 0x140, 0x140, 0x3b8, 0x3b8, 0x3b8, 0x4, &(0x7f0000000040), {[{{@arp={@multicast2, @rand_addr=0x6, 0xff, 0xffffff00, @empty, {[0xff, 0x0, 0xff, 0xff, 0x0, 0xff]}, @mac=@broadcast, {[0xff, 0xff, 0xff, 0xff]}, 0x1, 0x8, 0x9, 0x2, 0x3e00000, 0x6, 'lo\x00', 'team_slave_1\x00', {0xff}, {}, 0x0, 0x14a}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@broadcast, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xa, 0x1}}}, {{@uncond, 0xf0, 0x138}, @unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0xa17a, 'syz0\x00', 0xfffffffffffffffa}}}, {{@arp={@initdev={0xac, 0x1e, 0x0, 0x0}, @remote, 0xffffffff, 0xff0000ff, @mac, {[0xff, 0x0, 0xff, 0x0, 0xff, 0xff]}, @empty, {[0x0, 0xff, 0xff, 0xff, 0xff]}, 0x1, 0x6, 0x5, 0x0, 0x80, 0x1, 'eql\x00', 'vcan0\x00', {0xff}, {0xff}, 0x0, 0x31a}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@remote, @mac=@link_local, @multicast2, @multicast2, 0x1, 0x1}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4f0) [ 2939.119702] ================================================================== [ 2939.127695] BUG: KASAN: use-after-free in relay_switch_subbuf+0x8c0/0x930 [ 2939.134643] Read of size 8 at addr ffff88805114acf8 by task loop4/17029 [ 2939.141395] [ 2939.143049] CPU: 0 PID: 17029 Comm: loop4 Not tainted 4.19.37 #5 [ 2939.149220] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2939.158767] Call Trace: [ 2939.160553] syz-executor.5 invoked oom-killer: gfp_mask=0x6000c0(GFP_KERNEL), nodemask=(null), order=0, oom_score_adj=1000 [ 2939.161384] dump_stack+0x172/0x1f0 [ 2939.161433] ? relay_switch_subbuf+0x8c0/0x930 [ 2939.180858] print_address_description.cold+0x7c/0x20d [ 2939.186194] ? relay_switch_subbuf+0x8c0/0x930 [ 2939.190801] kasan_report.cold+0x8c/0x2ba [ 2939.194970] __asan_report_load8_noabort+0x14/0x20 [ 2939.199965] relay_switch_subbuf+0x8c0/0x930 [ 2939.204417] trace_note.isra.0+0x5b8/0x6e0 [ 2939.208682] __blk_add_trace+0xb70/0xe10 [ 2939.208832] syz-executor.5 cpuset= [ 2939.212858] ? shmem_mfill_atomic_pte+0x2280/0x2280 [ 2939.212897] blk_add_trace_rq+0x192/0x210 [ 2939.212919] blk_add_trace_rq_complete+0x153/0x1b0 [ 2939.212933] ? blk_add_trace_rq_requeue+0x1b0/0x1b0 [ 2939.213037] blk_update_request+0x79f/0xb30 [ 2939.213061] blk_mq_end_request+0x5b/0x360 [ 2939.227899] syz5 [ 2939.230794] lo_complete_rq+0x219/0x2f0 [ 2939.230816] blk_mq_complete_request+0x3c2/0x680 [ 2939.230832] loop_queue_work+0x2ab/0x2388 [ 2939.230849] ? mark_held_locks+0x100/0x100 [ 2939.250738] mems_allowed=0-1 [ 2939.250853] ? lo_rw_aio+0x1480/0x1480 [ 2939.270978] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2939.275588] ? trace_hardirqs_on+0x67/0x230 [ 2939.279940] ? kasan_check_read+0x11/0x20 [ 2939.284133] kthread_worker_fn+0x2c9/0x7a0 [ 2939.288402] ? kthread_freezable_should_stop+0x120/0x120 [ 2939.293901] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2939.299030] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2939.304599] loop_kthread_worker_fn+0x51/0x60 [ 2939.309118] kthread+0x357/0x430 [ 2939.312515] ? loop_info64_to_compat+0x6d0/0x6d0 [ 2939.317291] ? kthread_delayed_work_timer_fn+0x290/0x290 [ 2939.322765] ret_from_fork+0x3a/0x50 [ 2939.326495] [ 2939.326935] CPU: 1 PID: 17026 Comm: syz-executor.5 Not tainted 4.19.37 #5 [ 2939.328136] Allocated by task 15591: [ 2939.335095] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2939.338816] save_stack+0x45/0xd0 [ 2939.348156] Call Trace: [ 2939.351619] kasan_kmalloc+0xce/0xf0 [ 2939.354193] dump_stack+0x172/0x1f0 [ 2939.357911] kasan_slab_alloc+0xf/0x20 [ 2939.361538] dump_header+0x15e/0x929 [ 2939.365416] kmem_cache_alloc+0x12e/0x700 [ 2939.369127] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2939.373265] __d_alloc+0x2e/0x9d0 [ 2939.378360] ? ___ratelimit+0x60/0x595 [ 2939.381805] d_alloc_pseudo+0x1e/0x30 [ 2939.385692] ? do_raw_spin_unlock+0x57/0x270 [ 2939.389491] alloc_file_pseudo+0xe2/0x280 [ 2939.393899] oom_kill_process.cold+0x10/0x6f5 [ 2939.398041] sock_alloc_file+0x4d/0x170 [ 2939.402534] ? task_will_free_mem+0x139/0x6e0 [ 2939.406505] __sys_socket+0x150/0x220 [ 2939.411401] out_of_memory+0x936/0x12d0 [ 2939.415214] __x64_sys_socket+0x73/0xb0 [ 2939.419183] ? lock_downgrade+0x810/0x810 [ 2939.423142] do_syscall_64+0x103/0x610 [ 2939.427280] ? oom_killer_disable+0x280/0x280 [ 2939.431251] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2939.435742] ? find_held_lock+0x35/0x130 [ 2939.440922] [ 2939.444995] mem_cgroup_out_of_memory+0x1d2/0x240 [ 2939.446597] Freed by task 15591: [ 2939.451450] ? memcg_event_wake+0x230/0x230 [ 2939.454806] save_stack+0x45/0xd0 [ 2939.459119] ? do_raw_spin_unlock+0x57/0x270 [ 2939.462564] __kasan_slab_free+0x102/0x150 [ 2939.466968] ? _raw_spin_unlock+0x2d/0x50 [ 2939.471203] kasan_slab_free+0xe/0x10 [ 2939.475343] try_charge+0x1028/0x15b0 [ 2939.479131] kmem_cache_free+0x86/0x260 [ 2939.482941] ? find_held_lock+0x35/0x130 [ 2939.486916] dentry_free+0xed/0x170 [ 2939.490982] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2939.494596] __dentry_kill+0x45f/0x610 [ 2939.499454] ? kasan_check_read+0x11/0x20 [ 2939.503336] dentry_kill+0xd7/0x5e0 [ 2939.507469] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 2939.511090] dput+0x570/0x6a0 [ 2939.516433] mem_cgroup_try_charge+0x24d/0x5e0 [ 2939.519520] __fput+0x429/0x8b0 [ 2939.519541] ____fput+0x16/0x20 [ 2939.524131] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 2939.527404] task_work_run+0x14a/0x1c0 [ 2939.530671] __handle_mm_fault+0x1e55/0x3f80 [ 2939.535613] exit_to_usermode_loop+0x273/0x2c0 [ 2939.539496] ? vmf_insert_mixed_mkwrite+0x90/0x90 [ 2939.543894] do_syscall_64+0x52d/0x610 [ 2939.543915] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2939.548493] ? find_held_lock+0x35/0x130 [ 2939.553317] [ 2939.557211] ? handle_mm_fault+0x322/0xb30 [ 2939.562390] The buggy address belongs to the object at ffff88805114aca0 [ 2939.562390] which belongs to the cache dentry(33:syz2) of size 288 [ 2939.566459] ? kasan_check_read+0x11/0x20 [ 2939.568073] The buggy address is located 88 bytes inside of [ 2939.568073] 288-byte region [ffff88805114aca0, ffff88805114adc0) [ 2939.572310] handle_mm_fault+0x43f/0xb30 [ 2939.585290] The buggy address belongs to the page: [ 2939.585312] page:ffffea0001445280 count:1 mapcount:0 mapping:ffff8880a00364c0 index:0xffff88805114a720 [ 2939.589469] __get_user_pages+0x609/0x1770 [ 2939.605315] ? follow_page_mask+0x19c0/0x19c0 [ 2939.610219] flags: 0x1fffc0000000100(slab) [ 2939.619667] ? memset+0x32/0x40 [ 2939.623892] raw: 01fffc0000000100 ffff8880826fa638 ffffea00020c8148 ffff8880a00364c0 [ 2939.628393] populate_vma_page_range+0x20d/0x2a0 [ 2939.632609] raw: ffff88805114a720 ffff88805114a040 0000000100000005 ffff8880936f85c0 [ 2939.635981] __mm_populate+0x204/0x380 [ 2939.643838] page dumped because: kasan: bad access detected [ 2939.648595] ? populate_vma_page_range+0x2a0/0x2a0 [ 2939.656453] page->mem_cgroup:ffff8880936f85c0 [ 2939.660361] vm_mmap_pgoff+0x213/0x230 [ 2939.666055] [ 2939.671001] ? vma_is_stack_for_current+0xd0/0xd0 [ 2939.675469] Memory state around the buggy address: [ 2939.679361] ? kasan_check_read+0x11/0x20 [ 2939.680973] ffff88805114ab80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2939.685818] ? _copy_to_user+0xc9/0x120 [ 2939.690732] ffff88805114ac00: fb fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc [ 2939.694892] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2939.702226] >ffff88805114ac80: fc fc fc fc fb fb fb fb fb fb fb fb fb fb fb fb [ 2939.706205] ksys_mmap_pgoff+0xf7/0x630 [ 2939.713539] ^ [ 2939.713553] ffff88805114ad00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2939.719099] ? find_mergeable_anon_vma+0x2e0/0x2e0 [ 2939.726454] ffff88805114ad80: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 2939.730619] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2939.737888] ================================================================== [ 2939.745262] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2939.750197] Disabling lock debugging due to kernel taint [ 2939.757572] ? do_syscall_64+0x26/0x610 [ 2939.762304] Kernel panic - not syncing: panic_on_warn set ... [ 2939.762304] [ 2939.769691] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2939.797043] __x64_sys_mmap+0xe9/0x1b0 [ 2939.800954] do_syscall_64+0x103/0x610 [ 2939.804858] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2939.810062] RIP: 0033:0x458da9 [ 2939.813260] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2939.832273] RSP: 002b:00007efc5e497c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 2939.839998] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000458da9 [ 2939.847273] RDX: ffffffffffffffff RSI: 0000000000e7e000 RDI: 0000000020000000 [ 2939.854544] RBP: 000000000073bf00 R08: ffffffffffffffff R09: 0000000000000000 [ 2939.861813] R10: 0000000000009032 R11: 0000000000000246 R12: 00007efc5e4986d4 [ 2939.869081] R13: 00000000004c4ced R14: 00000000004d8900 R15: 00000000ffffffff [ 2939.876375] CPU: 0 PID: 17029 Comm: loop4 Tainted: G B 4.19.37 #5 [ 2939.883928] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2939.893387] Call Trace: [ 2939.895994] dump_stack+0x172/0x1f0 [ 2939.899641] ? relay_switch_subbuf+0x8c0/0x930 [ 2939.904239] panic+0x263/0x51d [ 2939.907458] ? __warn_printk+0xf3/0xf3 [ 2939.911370] ? lock_downgrade+0x810/0x810 [ 2939.915538] ? trace_hardirqs_off+0x62/0x220 [ 2939.919959] ? trace_hardirqs_off+0x59/0x220 [ 2939.924397] ? relay_switch_subbuf+0x8c0/0x930 [ 2939.929013] kasan_end_report+0x47/0x4f [ 2939.933034] kasan_report.cold+0xa9/0x2ba [ 2939.937207] __asan_report_load8_noabort+0x14/0x20 [ 2939.942147] relay_switch_subbuf+0x8c0/0x930 [ 2939.946586] trace_note.isra.0+0x5b8/0x6e0 [ 2939.950834] __blk_add_trace+0xb70/0xe10 [ 2939.954909] ? shmem_mfill_atomic_pte+0x2280/0x2280 [ 2939.957944] Task in [ 2939.959947] blk_add_trace_rq+0x192/0x210 [ 2939.959965] blk_add_trace_rq_complete+0x153/0x1b0 [ 2939.959982] ? blk_add_trace_rq_requeue+0x1b0/0x1b0 [ 2939.966332] /syz5 [ 2939.966458] blk_update_request+0x79f/0xb30 [ 2939.971640] killed as a result of limit of [ 2939.976510] blk_mq_end_request+0x5b/0x360 [ 2939.976527] lo_complete_rq+0x219/0x2f0 [ 2939.976545] blk_mq_complete_request+0x3c2/0x680 [ 2939.976562] loop_queue_work+0x2ab/0x2388 [ 2939.978982] /syz5 [ 2939.982947] ? mark_held_locks+0x100/0x100 [ 2939.991591] ? lo_rw_aio+0x1480/0x1480 [ 2939.991623] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2939.996605] memory: usage 307200kB, limit 307200kB, failcnt 556 [ 2940.000340] ? trace_hardirqs_on+0x67/0x230 [ 2940.000359] ? kasan_check_read+0x11/0x20 [ 2940.004727] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2940.006562] kthread_worker_fn+0x2c9/0x7a0 [ 2940.006578] ? kthread_freezable_should_stop+0x120/0x120 [ 2940.006593] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2940.006613] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2940.011054] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2940.014721] loop_kthread_worker_fn+0x51/0x60 [ 2940.014736] kthread+0x357/0x430 [ 2940.014755] ? loop_info64_to_compat+0x6d0/0x6d0 [ 2940.019561] Memory cgroup stats for [ 2940.025405] ? kthread_delayed_work_timer_fn+0x290/0x290 [ 2940.025423] ret_from_fork+0x3a/0x50 [ 2940.030826] Kernel Offset: disabled [ 2940.096992] Rebooting in 86400 seconds..